• Title/Summary/Keyword: game application

Search Result 647, Processing Time 0.027 seconds

The Development and Application of Regional Environmental Education Program Using Environment of Dam-Focusing on the Upper Zone of Hapcheon Dam (Geochang)- (댐 환경을 활용한 지역환경 교육 프로그램의 개발과 적용)

  • Lee, Young-Woo;Nam, Young-Sook
    • Hwankyungkyoyuk
    • /
    • v.17 no.2
    • /
    • pp.26-37
    • /
    • 2004
  • The goal of this paper is to develop a regional environmental education program using a regional environment of dam, and to set up a regional education for sustainable development with applying that program to the students. This environmental education program is based on Hungerford's project, which consists of 4 subjects. They are good and bad influences of dam environment which students can experience easily in daily life. Through the volunteering activities such as discussion, search and observation, pre- and post-test, study of value, presentation and game, students can decide which is a favorable strategy for preserving dam facilities well. And they are encouraged to take part in environmental preservation and practice what they learn everyday in the community. The following are the outcomes of this environmental education program: First, students are much more interested in regional and general environmental problems than before and participate in conservation activities voluntarily. Second, students express their willingness for the prevention of water pollution in Hapcheon Dam by collecting garbages and reducing synthetic detergent. Third, students demand some measures which connect the school program to citizen groups for the prevention of water pollution in Hapcheon Dam.

  • PDF

Active Network Performance Improvement for Security Application (보안 응용을 위한 능동 네트워크 성능 향상 방안)

  • 채철주;이명선;김상국;임정목;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.416-419
    • /
    • 2004
  • Computer simulation has used to a area of military training in recent years. Computer simulation endow a military nan with field raining such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct ㏈ to operate war game model, associate among federates on network. we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training spare such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

Education equipment for FPGA-based multimedia player design (FPGA 기반의 멀티미디어 재생기 설계 교육용 장비)

  • Yu, Yun Seop
    • Journal of Practical Engineering Education
    • /
    • v.6 no.2
    • /
    • pp.91-97
    • /
    • 2014
  • Education equipment for field programmable gate array (FPGA) based multimedia player design is introduced. Using the education equipment, an example of hardware design for color detection and augment reality (AR) game is described, and an example of syllabus for "Digital system design using FPGA" course is introduced. Using the education equipment, students can develop the ability to design some hardware, and to train the ability for the creative capstone design through conceptual, partial-level, and detail designs. By controlling audio codec, system-on-chip (SOC) design skills combining a NIOS II soft microprocessor and digital hardware in one FPGA chip are improved. The ability to apply wireless communication and LabView to FPGA-based digital design is also increased.

Semantic Analysis and Visualization on Mudras of Sahasra-bhuja Aryavalokitesvara Bodhisattva (천수관음의 수인에 나타난 의미 분석과 시각화)

  • Kim, Youngduk;Kim, Kyungdeok
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.520-528
    • /
    • 2017
  • In this paper, we analyze semantics on mudras of Sahasra-bhuja Avalokitesvara and implement visual content as its application. The mudras are described in the Odaejineunjib that is a tangible cultural property. The semantics analysis on the mudras are essential for understanding the meaning of the 42 Hands(mudras) that present symbolic difference of hands holding on various items. So, in this paper, we analyze the semantics on the 42 Hands according to 5 parts which are basic classification of Honored Ones on Esoteric Buddhism. We implemented a visual contents showing Avalokitesvara according to semantics on the 42 Hands. And, in the process, we are able to provide the public with easy accessibility on mudras of Sahasra-bhuja Avalokitesvara. Applications of the mudras are as follows; game contents, traditional cultural contents, etc.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Comparison between Word Embedding Techniques in Traditional Korean Medicine for Data Analysis: Implementation of a Natural Language Processing Method (한의학 고문헌 데이터 분석을 위한 단어 임베딩 기법 비교: 자연어처리 방법을 적용하여)

  • Oh, Junho
    • Journal of Korean Medical classics
    • /
    • v.32 no.1
    • /
    • pp.61-74
    • /
    • 2019
  • Objectives : The purpose of this study is to help select an appropriate word embedding method when analyzing East Asian traditional medicine texts as data. Methods : Based on prescription data that imply traditional methods in traditional East Asian medicine, we have examined 4 count-based word embedding and 2 prediction-based word embedding methods. In order to intuitively compare these word embedding methods, we proposed a "prescription generating game" and compared its results with those from the application of the 6 methods. Results : When the adjacent vectors are extracted, the count-based word embedding method derives the main herbs that are frequently used in conjunction with each other. On the other hand, in the prediction-based word embedding method, the synonyms of the herbs were derived. Conclusions : Counting based word embedding methods seems to be more effective than prediction-based word embedding methods in analyzing the use of domesticated herbs. Among count-based word embedding methods, the TF-vector method tends to exaggerate the frequency effect, and hence the TF-IDF vector or co-word vector may be a more reasonable choice. Also, the t-score vector may be recommended in search for unusual information that could not be found in frequency. On the other hand, prediction-based embedding seems to be effective when deriving the bases of similar meanings in context.

Metaverse Friend Making System Design and Implement (메타버스 비대면 친구사귀기 시스템 디자인 및 구현)

  • Chung, HaeKyung;Ko, JangHyok
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.97-102
    • /
    • 2021
  • In this study, we developed the service that can efficiently making friends among college students in metaverse world. Metaverse technology has recently emerged as an important topic across the industry.' The development of virtual and augmented reality technologies, which have emerged as a new paradigm to drive the next generation of the Internet, is bringing us closer to the metaverse world. Metaverse is spreading around the gaming, entertainment, music, and content industries[1]. In particular, as non-face-to-face transitions have accelerated since the COVID-19 outbreak, lifestyles and industrial sites are rapidly changing beyond untacting to metaverseization, a three-dimensional virtual space. After discovering the needs of users through surveys and interviews, the research method added functions to the service that matched those needs. Users were pleased that they could make friends who matched their preferences and tastes, play like a game in a virtual world called metaverse, and customize their avatars to their liking. It was also very fresh to customize the goods so that they could be gifted and kept by themselves.

Generative Adversarial Networks: A Literature Review

  • Cheng, Jieren;Yang, Yue;Tang, Xiangyan;Xiong, Naixue;Zhang, Yuan;Lei, Feifei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4625-4647
    • /
    • 2020
  • The Generative Adversarial Networks, as one of the most creative deep learning models in recent years, has achieved great success in computer vision and natural language processing. It uses the game theory to generate the best sample in generator and discriminator. Recently, many deep learning models have been applied to the security field. Along with the idea of "generative" and "adversarial", researchers are trying to apply Generative Adversarial Networks to the security field. This paper presents the development of Generative Adversarial Networks. We review traditional generation models and typical Generative Adversarial Networks models, analyze the application of their models in natural language processing and computer vision. To emphasize that Generative Adversarial Networks models are feasible to be used in security, we separately review the contributions that their defenses in information security, cyber security and artificial intelligence security. Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction.

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

The LaserFIB: new application opportunities combining a high-performance FIB-SEM with femtosecond laser processing in an integrated second chamber

  • Ben Tordoff;Cheryl Hartfield;Andrew J. Holwell;Stephan Hiller;Marcus Kaestner;Stephen Kelly;Jaehan Lee;Sascha Muller;Fabian Perez-Willard;Tobias Volkenandt;Robin White;Thomas Rodgers
    • Applied Microscopy
    • /
    • v.50
    • /
    • pp.24.1-24.11
    • /
    • 2020
  • The development of the femtosecond laser (fs laser) with its ability to provide extremely rapid athermal ablation of materials has initiated a renaissance in materials science. Sample milling rates for the fs laser are orders of magnitude greater than that of traditional focused ion beam (FIB) sources currently used. In combination with minimal surface post-processing requirements, this technology is proving to be a game changer for materials research. The development of a femtosecond laser attached to a focused ion beam scanning electron microscope (LaserFIB) enables numerous new capabilities, including access to deeply buried structures as well as the production of extremely large trenches, cross sections, pillars and TEM H-bars, all while preserving microstructure and avoiding or reducing FIB polishing. Several high impact applications are now possible due to this technology in the fields of crystallography, electronics, mechanical engineering, battery research and materials sample preparation. This review article summarizes the current opportunities for this new technology focusing on the materials science megatrends of engineering materials, energy materials and electronics.