• Title/Summary/Keyword: virtual force

Search Result 475, Processing Time 0.023 seconds

A Study on the Boundary Identified in the Immersive Space (이머시브 공간에서 나타나는 경계성 연구)

  • Son, Seo-Yeon;Ahn, Seong-Mo
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.2
    • /
    • pp.45-54
    • /
    • 2018
  • Immersive space is a new type of space, which is converged with other domains and expressed in various ways and here, a mutual exchange between space and participants is realized with active intervention of participants. The purpose of this study is to examine boundary changes and characteristics in virtual space and reality or inside and outside, focusing on immersive space. For this study, a case analysis was conducted, based on the key words regarding flow experience and boundary characteristics in immersive space. The boundary characteristics extracted are as follow. First, while immersive space is overlapped in many different ways, the boundary in space gradually changes and one unique and convergent space is formed. Also, a combination of overlap is made with internal and external physical force and a convergent boundary is created. Second, forms are mixed in diverse ways and an unrealistic boundary space is revealed. For new experience, it has familiar, but new experiential characteristics and also shows an expanded boundary by the medium of different domains. Third, a simultaneous space, based on variability of time and space, has an ambiguous boundary due to a meaningless physical boundary of space and changing into a space region constantly, it becomes an unlimited variable space. Fourth, a linear expansion-based emergent space has nonlinearity, which creates a meaningless boundary, recognized as an irregular, dynamic and transformative space and expands to a creative space. In conclusion, it is anticipated that based on diverse characteristics found in immersive space, this study would give unlimited inspiration to many design fields and art creation activities and contribute to a further development through continued research on immersive space.

A Hazardous Substance Monitoring Sensor Network Using Multiple Robot Vehicle (다수의 무인기를 이용한 유해 물질 감시 센서 네트워크)

  • Chun, Jeongmyong;Kim, Samok;Lee, Sanghu;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.147-155
    • /
    • 2015
  • In this paper, we consider a mobile sensor network for monitoring a polluted area where human beings cannot access. Due to the limited sensing range of individual unmanned vehicles, they need to cooperate to achieve an effective sensing coverage and move to a more polluted region. In order to address the limitations of sensing and communication ranges, we propose a hazardous substance monitoring network based on virtual force algorithms, and develop a testbed. In the considered monitoring network, each unmanned vehicle achieves an optimal coverage and move to the highest interest area based on neighboring nodes sensing values and locations. By using experiments based on the developed testbed, we show that the proposed monitoring network can autonomously move toward a more polluted area and obtain a high weighted coverage.

Teleoperation Using Reconstructed Graphic Model (재구성된 그래픽 모델을 이용한 원격제어)

  • Chung, Seong-Youb;Yoon, Hyun-Joong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.3876-3881
    • /
    • 2012
  • In typical master/slave teleoperation systems, a human operator generally manipulates the master to control the slave through the visual information like camera image. However, the operator may get into trouble due to the limited visual information depending on the camera positions and the delay on the visual information because of low communication bandwidth. To cope with this inherit problem in the camera-based teleoperation system, this paper presents a teleoperation system using a reconstructed graphic model instead of the camera image. The proposed teleoperation system consists of a robot control module, a master module using a force-reflective joystick, and a graphic user interface (GUI) module. The graphic user interface module provides the operator with a 3D model reconstructed using a small set of sensing data received from the remote site. The proposed teleoperation system is evaluated through a peg-in-hole assembly task.

The Performance Enhancement of Automatic Dependent Surveillance - Broadcast Using Information Fusion Method (정보융합 기법을 활용한 ADS-B 성능 개선)

  • Cho, Taehwan;Kim, Kanghee;Kim, inhyuk;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.345-353
    • /
    • 2015
  • In this paper, we proposed an information fusion method for enhancement of automatic dependent surveillance - broadcast (ADS-B) system which is one of the next generation navigation system. Although ADS-B provides better performance than traditional radar, ADS-B still has error due to dependence of global navigation satellite system (GNSS) information. In this paper, we improved the ADS-B performance using information fusion of multilateration (MLAT) and wide area multilateration (WAM). Information fusion provides accurate data compared to original data. Mostly, information fusion methods use Kalman filter or IMM(interacting multiple model) filter as a subfilter. However, we used Robust IMM filter as a subfilter to improve the aircraft tracking performance. Also, we use actual ADS-B data not virtual data to increase reliability of our information fusion method.

The Computation of Reinforcement Length of Afforestation Slope (사면녹화 보강토공법의 보강재길이 산정에 관한 연구)

  • Park, Sik-Choon;Nam, Kwang-On;Kim, Jong-Hwan;Lee, Soo-Yang
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.1302-1308
    • /
    • 2010
  • This study the change of the safety factor before and after the reinforcement were compared by performing the parameter research based on the limit equilibrium analysis regarding the same cross section after carrying out the safety factor before the reinforcement on the virtual section in order to observe the change of the safety factor of the slop reinforced with the slope planting reinforced earth, and the variation of the safety factor according to the increase of the length of the reinforcement materials and the change of the slope height was analyzed. As the result, the reinforcement effect was insignificant at no more than 0.6 of L/H, the reinforcement length ratio when the reinforcement length was increased, as the increase of the safety factor was slow comparing with the non-reinforced slope. At 3.0m of the slope height, reinforcement on the slope is not necessary, and at 3.0m to 5.0m of the slope height, the inclination was not influencing at no less than 0.6 of L/H. At 5.0m to 9.0m of the slope height, the safety factor was mostly secured on the slope at 0.8 of L/H and the over-reinforced slope appeared at no less than 1.0 of L/H. Also, the safety factor increased as the slope height increases and the slope gets steeper till 0.8 of L/H, but the slope steepness affects more on the increase of the safety factor than the reinforcement material, as the reinforcing force by the reinforcement material became steady.

  • PDF

Design Optimization of a Paper Feeding Mechanism using Numerical Analysis Program (수치해석 프로그램을 이용한 미디어 이송 장치의 기구학적 최적설계)

  • Lee S.G.;Choi J.H.;Bae D.S.;Cho H.J.;Song I.H.;Kim M.S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.107-108
    • /
    • 2006
  • This paper shows the design optimization of the paper feeding mechanism under dynamic behavior by using commercial codes of RecurDyn/MTT2D and RecurDyn/AutoDesign which are developed by functionBay, Inc. A virtual mockup for dynamics analysis of the paper feeding mechanism is build on RecurDyn/MTT2D and is simulated. Flexible paper is represented as a series of rigid bars connected by revolute joints and rotational spring dampers. Paper is fed by a contact and friction mechanism on rollers or guides. The slip of the paper and nip force of rollers are measured to estimate the system performance. After a simulation, these performances are automatically send to RecurDyn/AutoDesign which is a sequential approximate optimization tool based on the response surface modeling. RecurDyn/AutoDesign makes the approximate objective function and computes the optimized design points of the design variables and gives them to analysis tool. And then the simulation is repeated with the updated design variables. These processes are repeated until finding a tolerable design optimization. In this paper, a paper feeding mechanism is introduced and it is optimized with the proposed algorithms.

  • PDF

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

Study on Survival Effectiveness of Intelligent System for Warrior Platform by using AWAM (지상무기효과분석모델(AWAM)을 활용한 워리어 플랫폼 지능형 조절 시스템 생존 효과도에 관한 연구)

  • Kwon, Youngjin;Kim, Taeyang;Chae, Je Wook;Kim, Juhee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.277-285
    • /
    • 2020
  • Survivability in a battle field is the most important aspect to the warriors. To analyze the survival effectiveness of warrior platform, the simulation via war-game model is an essential step in advance to the development of platform. In this study, Army Weapon effectiveness Analysis Model(AWAM) was utilized for analysis. Several weapon parameters were adjusted to apply the characteristics of warrior platform in some cases of the defense and survival system. Especially, adjusted triage possibility, probability of kill, fatality and accuracy were employed as parameters in the simulation program to evaluate the survival effectiveness of intelligent system based on the previous researches. In the future battle field or virtual space in the AWAM, the warrior platform intelligent system could react emergency treatment on time by expoiting the bio-information of man at arms. Considering the order of supply priority, special force was selected as operating troops and battle scenario without engagement was selected to measure accurate survival effectiveness. In conclusion, the survivability of defence and survival system of the warrior platform was about 1.47 times higher than that of current system.

Buckling Analysis of Axisymmetric Shells by Incremental Finite Element Mothod (증분형(增分形) 유한요소법(有限要素法)에 의한 축대칭(軸對稱) Shell구조(構造)의 좌굴해석(挫屈解析))

  • J.B.,Kim;C.Y.,Kim
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.22 no.1
    • /
    • pp.21-30
    • /
    • 1985
  • This paper deals whth the buckling as well as postbuckling analysis of axisymmertric shells taking the initial deflection effects into account. Incremental equilibrium equations, based on the principle of virtual work, were derived by the finite element method, the successive step-by-step Newton-Raphson iterative technique was adopted. To define the transition pattern of postbuckling behavior from the prebuckling state more accurately, a simple solution method was developed, i.e. the critical load was calculated by the load extrapolation method with the determinant of tangent stiffness matrix and the equilibrium configuration in the immediate postbuckling stage was obtained by perturbation scheme and eigenvalue analysis. Degenerated isoparametric shell elements were used to analyse the axisymmetric shell of revolution. And by the method developed in this paper, the computer program applicable to the nonlinear analysis of both thin and moderately thick shells was constructed. To verify the capabilities and accuracies of the present solution method, the computed results were compared with the results of analytical solutions. These results coincided fairly well in both the small deflection and large deflection ranges. Various numerical analyses were done to show the effect of initial deflection and shape of shells on buckling load and postbuckling behavior. Futhermore, corrected directions of applied loads at every increment steps were used to determine the actual effects of large deflection in non-conservative load systems such as hydrostatic pressure load. The following conclusions can be obtained. (1) The method described in this paper was found to be both economic and effective in calculating buckling load and postbuckling behavior of shell structure. (2) Buckling and postbuckling behavior of spherical caps is critically dependent upon their geometric configuration, i.e. the shape of spherical cap and quantities of the initial deflection. (3) In the analysis of large deflection problems of shells by the incremental method, corrections of the applied load directions are needed at every incremental step to compensate the follower force effects.

  • PDF

Improvement of Runtime Intrusion Prevention Evaluator (RIPE) (실행시간 침입 방지 평가 프로그램(RIPE)의 개선)

  • Lee, Hyungyu;Lee, Damho;Kim, Taehwan;Cho, Donghwang;Lee, Sanghoon;Kim, Hoonkyu;Pyo, Changwoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1049-1056
    • /
    • 2015
  • Runtime Intrusion Prevention Evaluator (RIPE), published in 2011, is a benchmark suite for evaluating mitigation techniques against 850 attack patterns using only buffer overflow. Since RIPE is built as a single process, defense and attack routines cannot help sharing process states and address space layouts when RIPE is tested. As a result, attack routines can access the memory space for defense routines without restriction. We separate RIPE into two independent processes of defense and attacks so that mitigations based on confidentiality such as address space layout randomization are properly evaluated. In addition, we add an execution mode to test robustness against brute force attacks. Finally, we extend RIPE by adding 38 attack forms to perform format string attacks and virtual table (vtable) hijacking attacks. The revised RIPE contributes to the diversification of attack patterns and precise evaluation of the effectiveness of mitigations.