• Title/Summary/Keyword: cyber character

Search Result 72, Processing Time 0.029 seconds

Empirical Analysis of Political Communication Mode at Cyberspace (사이버 공간에서의 정치 커뮤니케이션 양식 분석 연구 : 제16대 공선 후보자 사이버 게시판 분석을 중심으로)

  • Hwang, Geun
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.207-254
    • /
    • 2001
  • This study is focused on forecasting the future of tole-democracy. Many Scholars expect that internet provides technological space needing realizing the tole-democracy or deliberate democracy. Especially in Korea, this expectation is higher than other nations because of political corruption and inefficiency. Therefore internet is intended to considering as new technologies reforming political process. In 16th the general election period, many candidates established home page and used as election campaign tool. And a little of home pages is payed attention to among voters. In spite of using internet as political medium, many political communication researchers have a doubt that internet will realize ideal direct democracy. It's reason is that internet is open and anonymous space. At anonymous space, communication participators is tended to be irresponsible and non-serious. Therefore it is hard that cyber-politics will be ideal type of democracy. In this context, this paper analyzed how pauicipators communicate with others at cyber bulletin board establishing candidate's home pages. Main research questions is how do discussions at cyberspace fulfill the conditions of deliberate democracy. Therefore, concrete questions include; who are participators at candidate's cyber bulletin board; which pattern do they communicate; what is the theme of communication; which effects do the anonymous character of cyberspace influence. To that purpose, this study conducted content analysis on 4,210 written matters at 82 cyber bulletin boards of candidate's home page establishing during 16th the general election period. It can be found that cyberspace in Korea still is not deliberate democracy space and not will be. Firstly, discussion patterns at cyber bulletin board is "candidate with supporters communication space. To be exact, it is said that candidate's home page is "the space of self-convincing among supporters." Secondly, the main themes of discussion are simple emotional expressions; "I support you!" "fighting" "Be vigor" etc. By contrast, real political contents'-central or local political matters - is relatively few. In the mode of expression, real political messages are more positive, logical than simple expressions, candidates private matters. Especially this characteristic will make cyberspace as "mutual slander space" consolidating anonymous characteristic of cyberspace. finally, Cyberspace in Korea still is not real "public sphere" realizing deliberate process. Therefore to be real public sphere, it is needed to participant's ethical maturity and political citizenship. In conclusion, it is difficult that cyberspace will reconstruct the Athene's Agora. On the contrary, Cyberagora will like to be irrespectable area fulfilling the sweeping. Making the deliberate space, technological possibility and ethical condition will have to be balanced together.

  • PDF

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

An Analysis of Game Storytelling Structure Focused on the Characters in RPG (캐릭터 중심의 RPG 스토리텔링 구조 분석)

  • Kim, Mi-Jin;Yoon, Sun-Jung
    • Journal of Korea Game Society
    • /
    • v.5 no.3
    • /
    • pp.17-24
    • /
    • 2005
  • The interaction property of digital media have changed traditional storytelling into a new concept, digital-storytelling, which has been widely accepted. Nowadays open-ended game storytelling, which different from story design of movie or animation, is chosen for the development of RPG. It can make infinite stories according to player character's decision. In this paper, we propose a game storytelling structure focused on the characters for RPG, and analyze how characters designed with various story-values interact with background stories and events in the cyber game world through case studies. This research is necessary to design predictable game mechanics and provide methods to control game play in case of special-purpose game.

  • PDF

A Design and Evaluation of WBI based on Agent considering Emotional Experience (감성체험을 고려한 에이전트 기반 WBI 설계 및 평가)

  • Lee, Jun-Hee;Kim, Jeong-Tae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.296-300
    • /
    • 2006
  • It is difficult to let computer express feelings because of the ambiguity and nonlinearity. But it is said that expressing emotions is very important for high quality data processing and improvement of interactivity in WBI. In this paper, I surveyed emotion models from the view point of psychology. Next, I proposed WBI(Web Based Instruction) based on character agent considering emotional experience. By experimental result, the proposed model shows that has more user's preference than other existing WBI.

  • PDF

A Study on a technology of extraction of motion objects (3차원 동작객체 추출기술에 관한 연구)

  • 오영진;박노국
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.3
    • /
    • pp.21-27
    • /
    • 1999
  • This paper introduces the research and development of automatic generation technology to develop the character agent. The R&D of this technology includes three major elements-body model generation, automatic motion generation and synthetic human generation. Main areas of application would by cyber space- 3D game, animation, virtual shopping, on line chatting, virtual education system, simulation and security system.

  • PDF

Depaysement in Henry Selick's Animations (헨리셀릭의 애니메이션에 나타난 데페이즈망 기법)

  • Park, Youn-O;Kim, Jae-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.179-186
    • /
    • 2010
  • In the base of tale stories, main character in Henry Selick's works is always faced with CAOS situation such as the separated world as two part real and cyber. That makes audience feel the sense of the real. I concentrated to research how audiences' estimate was formed and reversed and what type of surrealism techniques will happened in the animation for the near future. Animation will be shown the new possibilities with extension and harmony of all kinds of arts expression. This paper examines the study of animations by Henry Selick who is the world famous stop-motion animation director, production Art director. The case works are focused on 'Depaysement technique of Surrealism' in his works.

A Study on Mosaic Pattern in Modern Costume (현대복식에 나타난 모자이크풍 패턴에 관한 연구)

  • 남윤숙;김복희
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.2
    • /
    • pp.43-52
    • /
    • 2001
  • The purpose of this research is to study the aesthetic character of a mosaic which is expressed in the Modern Costume. The methods of the research were by literature and it was mainly done with reference to master's theses, doctor's theses, separate volumes, periodicals, domestic and overseas fashion magazines and internet on the subject. The result of the research appears as rhythm, exoticism, abstraction, mystery, recreation by disintegration. First, rhythm appears in a sense of free rhythm with the method of arranging motives and the kinds of materials varying. Second, exoticism gives impression with such motives as Oriental designs, African designs and the geometric designs of nature occupying the surface. Third, abstraction displays motives such as unrealistic fashion. Fourth, mystery gives a cyber-related impression with the help of such scientific materials as fluorescent plastics, metal and glass. Fifth, recreation pelves an aesthetic impression by reorganizing the costume with the disintegration and transformation of Industrial materials such as plastics, metal and glass, etc. based on their unique colors and quality.

  • PDF

Mobile digital storytelling using Hamel (하멜을 이용한 모바일 디지털 스토리텔링)

  • Ko, Seok-Ha;Lim, Ji-Hoon;Kim, Seong-Baeg;Moon, Hae-Gyoung;Hyun, Jung-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.172-175
    • /
    • 2006
  • Hamel has a scholastic value as the first person, who announces Jeju and Korea to Europe. However, there has been little research on developing digital contents except a few books about Hamel. We develop an educational game on PDA using Hamel, based on Hamel character, Jeju's unique culture, multimedia technology, and so on. Compared with the previous games, it is different from the form of gathering points and has various game scenarios through interactions between Hamel character and game space. The structure of this game, which connects Jeju culture and cyber space together, represents the form of a digital storytelling. You can study through this game. It uses quizzes about Jeju culture, crossword puzzles, finding a sequence, finding differences between two pictures to teach users, and fixing pieces of a figure, etc. When we made the game, we divided it into some independent modules to make new game series easily using contents of the other provinces.

  • PDF

A Study on the Awareness of User s to Avatar Characters in the Cyberspace (가상공간의 아바타 캐릭터에 대한 사용자의 인식조사)

  • 이향재
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • This study is focused on user awareness of avatar character in the cyber space. The purpose of this study is to investigate user preference toward avatar and test their awareness on it. The awareness of avatar is based on the applied degree of self-awareness, and also analyzed by factors using 3 elements such as loyalty, value and confidence in Maurice Wagner's study but self-projection was added to these three variables. The result shows that there is no significant statistical difference among response groups for age and sex classification but the preference and the value variables are significantly dependent on sex and age, respectively. There are strong correlation among each response variables for the awareness of avatar character and the loyalty and the preference variables are mostly correlated. The regression analysis shows that the preference of avatar is mostly affected by loyalty and thus the self awareness of avatar in the Cyberspace is proportional to user preference. It is shown that users do not awareness an avatar as a visual image but identify their avatar as an another selfness since they project themselves into those avatars.

  • PDF

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.