• Title/Summary/Keyword: Virtual information system

Search Result 2,240, Processing Time 0.033 seconds

Image Encryption and Decryption System using Frequency Phase Encoding and Phase Wrapping Method (주파수 위상 부호화와 위상 랩핑 방법을 이용한 영상 암호화 및 복호화 시스템)

  • Seo, Dong-Hoan;Shin, Chang-Mok;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.507-513
    • /
    • 2006
  • In this paper, we propose an improved image encryption and fault-tolerance decryption method using phase wrapping and phase encoding in the frequency domain. To generate an encrypted image, an encrypting key which denotes the product of a phase-encoded virtual image, not an original image, and a random phase image is zero-padded and Fourier transformed and its real-valued data is phase-encoded. The decryption process is simply performed by performing the inverse Fourier transform for multiplication of the encrypted key with the decrypting key, made of the proposed phase wrapping method, in the output plane with a spatial filter. This process has the advantages of solving optical alignment and pixel-to-pixel mapping problems. The proposed method using the virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting from unauthorized people and also can be used as a current spatial light modulator technology by phase encoding of the real-valued data. Computer simulations show the validity of the encryption scheme and the robustness to noise of the encrypted key or the decryption key in the proposed technique.

The Current Status and Development Direction of Mixed Reality Content (혼합현실 콘텐츠의 현황과 발전방향)

  • Kim, Hee-young
    • Cartoon and Animation Studies
    • /
    • s.46
    • /
    • pp.181-206
    • /
    • 2017
  • In the near future, we are expected to live in a Mixed Reality environment where reality and virtuality coexist as today we live using the Internet and smartphones in our daily lives. The relevant content based on the idea of Mixed Reality crystallizing is currently expanding, and it is time for research on it. This study examines the current situation and the development direction of mixed reality contents. Typical mixed reality contents can be classify by wearability. We analyzed HoloLens, a mixed reality wearable device that is worn on a head, which is a example of wearable device. As an example of unwearable device, we also analyzed the Room2Room which is a communication system that combines video with augmented reality-based telepresence avatar. Mixed Reality content will develop in the direction of implementing expanded use of information and more natural realism through the interactive combination of Reality, Virtual Reality, and Augmented Reality. As head-mounted wearable technology develops, Mixed Reality content is expected to become popular by increasing the number of Mixed Reality device users if convenience and price competitiveness are secured. The way of unifying Mixed Reality wearable devices must be established in order to increase convenience, and the environment based on Mixed Reality will be created through diversifying leisure activity content. Telepresence Avatar is expected to develop into Mobile Hologram Avar as Mixed Reality content accessible anywhere and at anytime beyond space limits. Another potential for development of Telepresence Avatar is the combination of Avatar moving on user's thought, Augmented Human technology and Mixed Reality.

Digital Reproduction of Mobiles (모빌의 디지털 재현)

  • Lee, Dong-Chun;Lee, Nam-Kyeong;Jung, Dae-Hyun;Kim, Chang-Tae;Lee, Dong-Kyu;Bae, Hee-Jung;Baek, Nakhoon;Lee, Jong-Won;Ryu, Kwan-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.415-423
    • /
    • 2001
  • Recently, there are many attempts to reproduce real world fine art pieces in digital forms. The digital representations are convenient to store and/or transmit. In contrast, mobiles, or moving sculptures, such as those designed by Alexander Calder cannot to reproduced realistically by usual reproduction techniques. Since mobiles are originally designed to generate motions in response to external forces applied to it, people could not fully enjoy them through photographs or static images. We present a virtual mobile system where use can easily control the mobile and can feel the impressions that the artist originally intended to provide. A real-world mobile is reconstructed in a three-dimensional physically-based model. and then virtual wind is generated to give motions to it. The motions of the mobile are generated by constraint dynamics and impulse dynamics techniques, which are modified to fully utilize the characteristics of the mobile, and finally give interactive displays on the PC platforms. The techniques presented can easily be extended to simulate other interactive dynamics systems.

  • PDF

Bioinformatics services for analyzing massive genomic datasets

  • Ko, Gunhwan;Kim, Pan-Gyu;Cho, Youngbum;Jeong, Seongmun;Kim, Jae-Yoon;Kim, Kyoung Hyoun;Lee, Ho-Yeon;Han, Jiyeon;Yu, Namhee;Ham, Seokjin;Jang, Insoon;Kang, Byunghee;Shin, Sunguk;Kim, Lian;Lee, Seung-Won;Nam, Dougu;Kim, Jihyun F.;Kim, Namshin;Kim, Seon-Young;Lee, Sanghyuk;Roh, Tae-Young;Lee, Byungwook
    • Genomics & Informatics
    • /
    • v.18 no.1
    • /
    • pp.8.1-8.10
    • /
    • 2020
  • The explosive growth of next-generation sequencing data has resulted in ultra-large-scale datasets and ensuing computational problems. In Korea, the amount of genomic data has been increasing rapidly in the recent years. Leveraging these big data requires researchers to use large-scale computational resources and analysis pipelines. A promising solution for addressing this computational challenge is cloud computing, where CPUs, memory, storage, and programs are accessible in the form of virtual machines. Here, we present a cloud computing-based system, Bio-Express, that provides user-friendly, cost-effective analysis of massive genomic datasets. Bio-Express is loaded with predefined multi-omics data analysis pipelines, which are divided into genome, transcriptome, epigenome, and metagenome pipelines. Users can employ predefined pipelines or create a new pipeline for analyzing their own omics data. We also developed several web-based services for facilitating downstream analysis of genome data. Bio-Express web service is freely available at https://www. bioexpress.re.kr/.

Development of Java/VRML-based 3D GIS's Framework and Its Prototype Model (Java/VRML기반 3차원 GIS의 기본 구조와 프로토타입 모델 개발)

  • Kim, Kyong-Ho;Lee, Ki-Won;Lee, Jong-Hun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.6 no.1 s.11
    • /
    • pp.11-17
    • /
    • 1998
  • Recently, 3D GIS based on 3D geo-processing methodology and Internet environment are emerging issues in GIS fields. To design and implement 3D GIS, the strategic linkage of Java and VRML is first regarded: 3D feature format definition in the passion of conventional GIS including aspatial attributes, 3B feature indexing, 3D analytical operators such as selection, buffering, and Near, Metric operation such as distance measurement and statistical description, and 3D visualization. In 3D feature format definition, the following aspects are implemented: spatial information for 3D primitives extended from 2D primitives, multimedia data, object texture or color of VRML specification. DXF-format GIS layers with additional attributes are converted to 3D feature format and imported into this system. While, 3D analytical operators are realized in the form of 3D buffering with respect to user-defined point, line, polygon, and 3D objects, and 3D Near functions; furthermore, 'Lantern operator' is newly introduced in this 3D GIS. Because this system is implemented by Java applet, any client with Java-enable browser including VRML browser plug-in can utilize the new style of 3D GIS function in the virtual space. Conclusively, we present prototype of WWW-based 3D GIS, and this approach will be contribute to development of core modules on the stage of concept establishment and of real application model in future.

  • PDF

Analysis of news bigdata on 'Gather Town' using the Bigkinds system

  • Choi, Sui
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.53-61
    • /
    • 2022
  • Recent years have drawn a great attention to generation MZ and Metaverse, due to 4th industrial revolution and the development of digital environment that blurs the boundary between reality and virtual reality. Generation MZ approaches the information very differently from the existing generations and uses distinguished communication methods. In terms of learning, they have different motivations, types, skills and build relationships differently. Meanwhile, Metaverse is drawing a great attention as a teaching method that fits traits of gen MZ. Thus, the current research aimed to investigate how to increase the use of Metaverse in Educational Technology. Specifically, this research examined the antecedents of popularity of Gather Town, a platform of Metaverse. Big data of news articles have been collected and analyzed using the Bigkinds system provided by Korea Press Foundation. The analysis revealed, first, a rapid increasing trend of media exposure of Gather Town since July 2021. This suggests a greater utilization of Gather Town in the field of education after the COVID-19 pandemic. Second, Word Association Analysis and Word Cloud Analysis showed high weights on education related words such as 'remote', 'university', and 'freshman', while words like 'Metaverse', 'Metaverse platform', 'Covid19', and 'Avatar' were also emphasized. Third, Network Analysis extracted 'COVID19', 'Avatar', 'University student', 'career', 'YouTube' as keywords. The findings also suggest potential value of Gather Town as an educational tool under COVID19 pandemic. Therefore, this research will contribute to the application and utilization of Gather Town in the field of education.

Pedestrian Multi-Agent Model in College Town Streets (대학촌 가로의 보행환경 개선을 위한 보행자 멀티에이전트(Pedestrian Multi-Agent) 모델링)

  • Moon, Tae-Heon;Han, Soo-Chel;Sung, Han-Uk;Jeong, Kyeong-Seok
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.2
    • /
    • pp.194-205
    • /
    • 2006
  • The purpose of this study is to develop a pedestrian multi-agent model and simulation system using multi-agent theory, which may be utilized as a planning support system for building a comfort and safe environment of pedestrian street. Differing from existing pedestrian models, however, every single pedestrian was regarded as an individual agent in the model. Multiple agents like multiple pedestrians in the street then maintain their own characteristics and respond to surrounding environment. In addition their moving behavior are made by their own decision rules that they have or had acquired through the interactive communications or learning between agents like real world. After verifying the model validation, as the $R^2$ between the predicted value and observed value was up to 0.781, the developed model was applied to Gazwa district within Gyeongsang university village. The simulation system was developed by Flash MX action scripts and the physical environment of the streets was configured with the digital map and ArcGis within computer virtual space. The attribute data of buildings such as type and size of commercial business were collected through the field survey and combined with physical features. Then the effect of the variation of building attractiveness and the occurrence of street events to pedestrian environment were simulated. Through the experiments this study could make suggestions to improve pedestrian environment.

  • PDF

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

Compiler technology training through a virtual e-learning content programming language (가상 컴파일러 기술을 통한 실습 형 프로그래밍언어 e-learning 콘텐츠)

  • Lee, Ho-Jin;Kang, Hee-Su;Youn, Jun-Su;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.867-870
    • /
    • 2014
  • Currently a number of universities and other educational institutions in the e-learning education system being implemented. Also that there is a demand. However, existing e-learning system has many problems. First, the theory of how the university -centered education and training institutions to adopt e-learning system has become the biggest obstacle. In addition, students can not engage the problem of a one-way lecture. In this paper, the theory -oriented and practice to overcome the one-way river systems programming language will develop e-learning content. Using socket communication and multi-threaded server-side Web browser on the client side through the compiler without installing a separate application installation and environmental learning environment can be unrestricted. Hands- content programming language allows the learner to direct the client-side source code in a web browser by entering the lecture is leading the way. For learners to enter the source code compiled to run on the server side, the compiler provides the learner results. Hands- because the future e-learning content development in e-learning systems will be a major contribution to.

  • PDF

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.