• Title/Summary/Keyword: defense game

Search Result 93, Processing Time 0.025 seconds

Estimating the determinants of victory and defeat through analyzing records of Korean pro-basketball (한국남자프로농구 경기기록 분석을 통한 승패결정요인 추정: 2010-2011시즌, 2011-2012시즌 정규리그 기록 적용)

  • Kim, Sae-Hyung;Lee, Jun-Woo;Lee, Mi-Sook
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.5
    • /
    • pp.993-1003
    • /
    • 2012
  • The purpose of this study was to estimate the determinants of victory and defeat through analyzing records of Korean men pro-basketball. Statistical models of victory and defeat were established by collecting present basketball records (2010-2011, 2011-2012 season). Korea Basketball League (KBL) informs records of every pro-basketball game data. The six offence variables (2P%, 3P%, FT%, OR, AS, TO), and the four defense variables (DR, ST, GD, BS) were used in this study. PASW program was used for logistic regression and Answer Tree program was used for the decision tree. All significance levels were set at .05. Major results were as follows. In the logistic regression, 2P%, 3P%, and TO were three offense variables significantly affecting victory and defeat, and DR, ST, and BS were three significant defense variables. Offensive variables 2P%, 3P%, TO, and AS are used in constructing the decision tree. The highest percentage of victory was 80.85% when 2P% was in 51%-58%, 3P% was more than 31 percent, and TO was less than 11 times. In the decision tree of the defence variables, the highest percentage of victory was 94.12% when DR was more than 24, ST was more than six, and BS was more than two times.

A Study on 3D Virtual Restoration and Convergence Utilization of Gas Masks for Digital Reproduction of War Cultural Heritage (전쟁 문화유산 디지털 재현을 위한 방독면 3D 가상 복원 및 융합 활용 연구)

  • Hyoung-Ki Ahn;Seung-Jun Oh;Ho-Yeon Lee;Young-Guy Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • In January 2007, the Remains Excavation and Investigation Team of the Ministry of National Defense was established, and full-scale excavation of remains was promoted. Currently, the scope of the excavation is being expanded to Baekma Hill within the DMZ, where fierce battles were fought during the Korean War. Now, many remains and remains are being excavated in Baekma hill. Most are in damaged condition. Therefore, in this study, the original form of the excavated remains was restored using 3D scanning and 3D modeling. This digital restoration method can be an alternative to compensate for the disadvantages of the manual method. Currently, various digital restorations using 3D technology are active in the field of cultural heritage. Digitally restored materials can be used as basic data for digital heritage. Based on this, various contents related to excavation of remains and patriots and veterans can be developed. Furthermore, if digital human restoration is made based on the excavated remains, it will be possible to reproduce the appearance of the dead.

Factors Contributing to Winning in Ice Hockey: Analysis of 2017 Ice Hockey World Championship (2017 International Ice Hockey Federation World Championship의 승리 결정요인 분석)

  • Lee, Jusung;Kim, Hyeyoung;Kim, Chaeeun;Pathak, Prabhat;Moon, Jeheon
    • 한국체육학회지인문사회과학편
    • /
    • v.57 no.4
    • /
    • pp.387-394
    • /
    • 2018
  • The purpose of this study is to provide information regarding the strategies by identifying the main variables that determines the winning team based on the records of all games of the 2017 IIHF World Championship Top league. 64 matches were analyzed for the study. 6 variables were analyzed which included ratio of saves, shots on goal, penalties in minutes, time for power play, power play goals, and face off wins. Logistic regression analysis (LRA), multiple regression analysis (MRA), and principal component analysis (PCA) were implemented to examine the relationship between win and loss. In case of LRA, shots on goal (p<.001), face-off wins (p<.001) had significantly positive relation to winning of game whereas, penalties in minutes (p<.01) and time on power play (p<.01) had significantly negative. Using MRA, win percentage was calculated which had significant positive correlation to ratio of saves (p<.01) and face-off wins (p<.001) whereas, a significant negative with penalties in minutes (p<.001). For PCA, the winning team consisted of penalty, attack, and defense factors whereas, losing teams consisted only the attack and defense factors.

A Study on the Optimal Size of Dum in Professional (프로바둑에서 덤의 크기 관한 연구)

  • Kim, Jin-Ho
    • The Korean Journal of Applied Statistics
    • /
    • v.20 no.2
    • /
    • pp.245-255
    • /
    • 2007
  • In playing Baduk, Black plays first and, thus, can control the pace of a game. Usually a player with black stones plays conservatively to maintain the advantage of playing first. The purpose of dum is to compensate for Black having the first move. Currently, 6.5-point dum is applied in Korea and Japan, while 8-point dum is applied in Taiwan and China. In this study we investigated whether the current size of dum(6.5 points) is optimal, by statistically analyzing and comparing the advantage of taking Black across two data sets with different dun rules. Under the 5.5-point handicap, Blacks won significantly more games than Whites, revealing the advantage of playing first. However, with 6.5-point dum, Black's advantage of playing first was not significant. In Conclusion, implications and future research areas are discussed.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

An Efficient Hand Gesture Recognition Method using Two-Stream 3D Convolutional Neural Network Structure (이중흐름 3차원 합성곱 신경망 구조를 이용한 효율적인 손 제스처 인식 방법)

  • Choi, Hyeon-Jong;Noh, Dae-Cheol;Kim, Tae-Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.66-74
    • /
    • 2018
  • Recently, there has been active studies on hand gesture recognition to increase immersion and provide user-friendly interaction in a virtual reality environment. However, most studies require specialized sensors or equipment, or show low recognition rates. This paper proposes a hand gesture recognition method using Deep Learning technology without separate sensors or equipment other than camera to recognize static and dynamic hand gestures. First, a series of hand gesture input images are converted into high-frequency images, then each of the hand gestures RGB images and their high-frequency images is learned through the DenseNet three-dimensional Convolutional Neural Network. Experimental results on 6 static hand gestures and 9 dynamic hand gestures showed an average of 92.6% recognition rate and increased 4.6% compared to previous DenseNet. The 3D defense game was implemented to verify the results of our study, and an average speed of 30 ms of gesture recognition was found to be available as a real-time user interface for virtual reality applications.

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

A Proposal for Software Framework of Intelligent Drones Performing Autonomous Missions (지능형 드론의 자율 임무 수행을 위한 소프트웨어 프레임워크 제안)

  • Shin, Ju-chul;Kim, Seong-woo;Baek, Gyong-hoon;Seo, Min-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.205-210
    • /
    • 2022
  • Drones, which have rapidly grown along with the 4th industrial revolution, spread over industries and also widely used for military purposes. In recent wars in Europe, drones are being evaluated as a game changer on the battlefield, and their importance for military use is being highlighted. The Republic of Korea Army also planned drone-bot systems including various drones suitable for echelons and missions of the military as future defense forces. The keyword of these drone-bot systems is autonomy by artificial intelligence. In addition, common use of operating platforms is required for the rapid development of various types of drones. In this paper, we propose software framework that applies diverse artificial intelligence technologies such as multi-agent system, cognitive architecture and knowledge-based context reasoning for mission autonomy and common use of military drones.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.