• Title/Summary/Keyword: Virtual money

Search Result 62, Processing Time 0.018 seconds

Comparison of simulation racing reality using simulation racing data based on racing equipment (레이싱 장비 기반의 시뮬레이션 레이싱 데이터를 활용한 시뮬레이션 레이싱 현실성 비교)

  • Lee, Yoseb;Lim, Young-Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.393-398
    • /
    • 2022
  • In order to experience and compete in car racing in reality, the barrier to entry is very high. It takes a lot of money and time to recruit or participate in a license, expensive vehicle, and stadium where the game can be played. Because of this problem, various equipment is used to create a feeling similar to real racing in their own space through sim racing equipment. Equipment similar to this reality is called sim racing equipment. The sim racing equipment can be divided into three categories. The first is a racing game device that can run virtual racing, the second is a steering wheel, seat, and cradle that are linked to the racing game device, and the third is a racing motion device that allows the body to experience the direction of movement in the racing game. In this thesis, the feeling of real car racing is based on game racing, and how similar reality to real racing is through the steering wheel and cradle equipment, which are equipment that can control game racing, and motion equipment that allows you to experience the direction of game racing. Let's check how the difference between real racing and data value changes through the G-Force direction and speed change values.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.