• Title/Summary/Keyword: digital I & C

Search Result 405, Processing Time 0.038 seconds

Implementation of Multiplatform Game Application for Decorating The Lab (다중 플랫폼용 실습실 꾸미기 게임 앱 구현)

  • Rho, Wonbin;Won, Moonsook;Lee, Jihye;Ko, Eunbyul;Lee, Jongwoo
    • Journal of Digital Contents Society
    • /
    • v.15 no.2
    • /
    • pp.197-207
    • /
    • 2014
  • Many people are now enjoying mobile games using various smartphone platforms. However, we have to develop games separately for each smart device platforms so far. Cocos2d-x, a game development framework is released to solve this problem. As a multiplatform version of the existing Cocos2d, Cocos2d-x can make one source code run on various platforms. It is an open software that is able to be used by everyone, and when using it, mobile games can be developed easily based on C++ and OpenGL. In this paper, we implemented a PC laboratory decorating game application, named ILove501, using Cocos2d-x. The 501 is a room number of our PC lab. ILove501 includes an educational feature of solving quizzes in order to highlight positive effects of game. For implementation of a multiplatform game, ILove501 was developed in Windows and iOS environment at the same time, and we verified the results of the execution by porting on a variety of devices such as Android, iPhone, iPad and Galaxy Tab.

Research trends in rehabilitation program for disabled applying virtual reality technology in Korea (가상현실기술을 적용한 국내 장애인재활프로그램 연구동향)

  • Kim, Mi-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.381-391
    • /
    • 2015
  • The purpose of this study was to investigate the trends in research on the effects of virtual reality technology applied to rehabilitation for disabled. I have collected 60 papers published in Korea(2000-2014), and analyzed it by the P.I.C.O. method. As a result, adults and the elderly are most common subjects, and projection type has been used frequently in researches. It were included mostly balance, upper extremity function, and gait that the dependent variables represents the intervention effects. I interpreted it as the ICF factors. So, research topics were the most common mobility, in contrast to educational, vocational, recreational area as dealing with the participation area is very small. In the future, we should focused on social aspects for useful intervention in real life of people with disabilities based on virtual reality technology, and virtual reality technology should be easy to apply in terms of cost and accessibility.

CUDA-based Object Oriented Programming Techniques for Efficient Parallel Visualization of 3D Content (3차원 콘텐츠의 효율적인 병렬 시각화를 위한 CUDA 환경 기반 객체 지향 프로그래밍 기법)

  • Park, Tae-Jung
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.169-176
    • /
    • 2012
  • This paper presents a parallel object-oriented programming (OOP) platform for efficient visualization of three-dimensional content in CUDA environments. For this purpose, this paper discusses the features and limitations in implementing C++ object-oriented codes using CUDA and proposes the solutions. Also, it presents how to implement a 3D parallel visualization platform based on the MVC (Model/View/Controller) design pattern. Also, it provides sample implementations for integral MLS (iMLS) and signed distance fields (SDFs) based on the Marching Cubes and Raytracing. The proposed approach enables GPU parallel processing only by implementing simple interfaces. Based on this, developers can expect general benefits that are common in general OOP techniques including abstractization and inheritance. Though I implemented only two specific samples in this paper, I expect my approach can be widely applied to general computer graphics problems.

Structure design of Csl-Se Detector using Monte Carlo Simulation (몬테카를로 시뮬레이션을 통한 Csl-Se 검출기의 구조 설계)

  • Park, Ji-Koon;Kang, Sang-Sik;Choi, Jang-Young;Lee, Hung-Won;Nam, Sang-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.420-423
    • /
    • 2002
  • In recent years, there has been keen interest in developing f1at panel detectors for all modalities of radiology, including gerneral radiology, fluoroscopy(angiography and cardiology), electronic portal imaging, and mammography. In this paper, we report the new hybrid x-ray detector consisted of CsI(Tl) photoemission layer and a-Se photoconductor layer to resolve conventional x-ray detector such as the direct detector using a-Se and the indirect detector using CsI(Tl)/a-Si. To design the structure of CsI(Tl)/a-Se detector, the penetrated energy spectrum and absorption fraction was estimated using MCNP 4C code. Experimental results showed that the absorption fraction of $500{\mu}m-Se$ film and $150{\mu}m-CsI\left(Tl \right)/a-Se\left( 30{\mu}m \right)$ film is 70% at 70 kVp. The absorption energy is 90% at $350{\mu}m-CsI(Tl)$.

  • PDF

Improvement in computing times by the elimination of redundancies in existing DFT and FFT (DFT 및 FFT에 있어서의 Redundancies와 그의 제거에 의한 Fourier 변환고속화)

  • 안수길
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.14 no.6
    • /
    • pp.26-30
    • /
    • 1977
  • Redundancies in the Calculation of DFT and FFT are analized and new algorithms are proposed which are capable of reducing the machine time by a considerable amount. New extensions of T.D C.F. and T.D.F.T. are given for the discrete case which permit a deeper insights for the techniques of digital signal Proessing i. e. Discrete Fourier Transform, Convolution Sum and Correlation sequences.

  • PDF

Introduction of Requirements and Regulatory Guide on Cyber Security of I&C Systems in Nuclear Facilities (원전 계측제어시스템의 사이버보안 요구사항)

  • Kang, Young-Doo;Jeong, Choong-Heui;Chong, Kil-To
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.209-210
    • /
    • 2008
  • In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the critical systems of nuclear facilities may seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security program throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the KINS' regulatory position on cyber security program to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory position includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems.

  • PDF

A Personal Digital Library on a Distributed Mobile Multiagents Platform (분산 모바일 멀티에이전트 플랫폼을 이용한 사용자 기반 디지털 라이브러리 구축)

  • Cho Young Im
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.12
    • /
    • pp.1637-1648
    • /
    • 2004
  • When digital libraries are developed by the traditional client/sever system using a single agent on the distributed environment, several problems occur. First, as the search method is one dimensional, the search results have little relationship to each other. Second, the results do not reflect the user's preference. Third, whenever a client connects to the server, users have to receive the certification. Therefore, the retrieval of documents is less efficient causing dissatisfaction with the system. I propose a new platform of mobile multiagents for a personal digital library to overcome these problems. To develop this new platform I combine the existing DECAF multiagents platform with the Voyager mobile ORB and propose a new negotiation algorithm and scheduling algorithm. Although there has been some research for a personal digital library, I believe there have been few studies on their integration and systemization. For searches of related information, the proposed platform could increase the relationship of search results by subdividing the related documents, which are classified by a supervised neural network. For the user's preference, as some modular clients are applied to a neural network, the search results are optimized. By combining a mobile and multiagents platform a new mobile, multiagents platform is developed in order to decrease a network burden. Furthermore, a new negotiation algorithm and a scheduling algorithm are activated for the effectiveness of PDS. The results of the simulation demonstrate that as the number of servers and agents are increased, the search time for PDS decreases while the degree of the user's satisfaction is four times greater than with the C/S model.

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

Digital Implementation of Delta Modulation Technique for Current-Fed Active Power Filters (전류형 능동필터를 위한 델타변조제어기법의 디지탈 구현)

  • Kang, Byong-Hee;Hwang, Jong-Gyu;Gho, Jae-Soek;Mok, Hyung-Soo;Cho, Gyu-Ha
    • Proceedings of the KIEE Conference
    • /
    • 1994.07a
    • /
    • pp.400-402
    • /
    • 1994
  • This paper presents a digital implementation of delta modulation Technique for Active Power Filters. Delta modulated scheme is to control the harmonic-compensating current indirectly by adjusting the capacitor voltage to be sinusoidal. The overall control system has two feedback loops. One is the outer propotional feedback for loop regulating the dc current of active filters and the other is the inner feedback loop for maintaining the ac current waveform to be sinusoidal, and have zero power factor angle(i.e. unity power factor). The characteristics of the proposed is investigated by digital simulation using ACSL and experimental results are obtained by TMS370C756 Single-Chip Microprocessor relative to analog delta modulation technique.

  • PDF