• Title/Summary/Keyword: virtual training system

Search Result 325, Processing Time 0.03 seconds

A Study on Adequacy of Audit Techniques and Advancement of Ship-Handling Simulation for Maritime Safety Audit (해상교통안전 진단 기술의 적정성 및 선박조종시뮬레이션 고도화)

  • Lee, Yun-Sok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.4
    • /
    • pp.391-398
    • /
    • 2011
  • SHS(Ship-Handling Simulator) is virtual generation of vessel traffic situation under various environmental conditions. Recent, with the introduction of MSA(Maritime Safety Audit), SHS is being used as a key facility to determine the safety of navigation. However, the current audit techniques specified in the implementation guidance of MSA have been prepared by generalizing common procedures and evaluation methods used by institutions operating simulator systems. Therefore, they need to be reviewed and supplemented. This study analyzed the adequacy of current audit techniques based on the limitations and problems, then suggested the advanced scheme of SHS such as standardization of ship models, standard manoeuvring and evaluation method. The results of this research will contribute to improving the quantification and reliability of audit techniques used in the MSA as well as upgrading of the simulator system.

A Study on Evaluating Digital Illusion Level of Public Library (공공도서관의 디지털 통합 수준 평가에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.167-203
    • /
    • 2015
  • This study tends to apprehend how much public library contributes to a role of upbuilder of digital integrated local society through a survey. For this, I performed the survey on 935 organization of public library in the whole country registered in national library statistical system. As a result, firstly, it's apprehended that equipment infra, Internet infra, etc like computer, laptop, scanner, tablet PC, etc are in relatively high level. Secondly, service or resource like electronic book, digital and virtual reference service, library service mobile App, etc that users can use are in relatively high level but software supporting cooperation and group task, fusibility of participating space, etc are shown very low level. Thirdly, the rate of literacy training relating to technology were only 22.4%, education subject focused on resource searching subject and somewhat future-oriented technical education like directions of video conference technique, cloud computing application education, etc wasn't conducted. Finally, we should consider expansion of providing technology and equipment and provision of future-oriented service and education according to a flow of the time that needs to seek change in various roles of library as enjoying culture space or creative space.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Kernel Regression Model based Gas Turbine Rotor Vibration Signal Abnormal State Analysis (커널회귀 모델기반 가스터빈 축진동 신호이상 분석)

  • Kim, Yeonwhan;Kim, Donghwan;Park, SunHwi
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.101-105
    • /
    • 2018
  • In this paper, the kernel regression model is applied for the case study of gas turbine abnormal state analysis. In addition to vibration analysis at the remote site, the kernel regression model technique can is useful for analyzing abnormal state of rotor vibration signals of gas turbine in power plant. In monitoring based on data-driven techniques correlated measurements, the fault free training data of shaft vibration obtained during normal operations of gas turbine are used to develop a empirical model based on auto-associative kernel regression. This data-driven model can be used to predict virtual measurements, which are compared with real-time data, generating residuals. Any faults in the system may cause statistically abnormal changes in these residuals and could be detected. As the result, the kernel regression model provides information that can distinguish anomalies such as sensor failure in a shaft vibration signal.

BLE-based Indoor Positioning System design using Neural Network (신경망을 이용한 BLE 기반 실내 측위 시스템 설계)

  • Shin, Kwang-Seong;Lee, Heekwon;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.75-80
    • /
    • 2021
  • Positioning technology is performing important functions in augmented reality, smart factory, and autonomous driving. Among the positioning techniques, the positioning method using beacons has been considered a challenging task due to the deviation of the RSSI value. In this study, the position of a moving object is predicted by training a neural network that takes the RSSI value of the receiver as an input and the distance as the target value. To do this, the measured distance versus RSSI was collected. A neural network was introduced to create synthetic data from the collected actual data. Based on this neural network, the RSSI value versus distance was predicted. The real value of RSSI was obtained as a neural network for generating synthetic data, and based on this value, the coordinates of the object were estimated by learning a neural network that tracks the location of a terminal in a virtual environment.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Development of Emotional Expression Assessment System and a Clinical Pilot Test (감정표현 평가 시스템 개발 및 실험적 적용)

  • Han, Ki-Wan;Kim, Kwang-Uk;Ku, Jeong-Hun;Jang, Hee-Jeong;Park, Jun-Young;Kim, In-Young;Kim, Jae-Jin;Kim, Chan-Hyung;Kim, Sun-I.
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.1099-1106
    • /
    • 2006
  • 정신질환자들은 자기감정을 표현하는 능력의 결손을 보인다. 이러한 자기 감정표현기술은 정신질환자들을 위한 사회기술훈련 (Social Skill Training) 과정 중 하나로서 정상적인 사회생활로의 복귀를 위해 반드시 필요하다. 지금까지의 자기감정표현 훈련 및 평가 방법은 치료자 능력의 차이에 따른 주관적 판단이 개입될 수 있다는 문제점을 가지고 있다. 가상현실 (Virtual Reality)은 컴퓨터를 이용한 최신의 방법으로, 최근 자폐증이나 공포증 등의 정신질환 분야에도 적용되고 있다. VR 을 사용하면 상호작용을 할 수 있고, 다양한 환경과 자극을 제시할 수 있으며, 3 차원 랜더링을 통해 몰입감을 제공할 수 있다. 또한 저장된 파라미터들을 바탕으로 객관적 판단을 할 수 있는 기준을 제시할 수 있으며, 안전하고 시간과 공간적 제약이 적은 환경 내에서 과제를 수행할 수 있다. 이에 본 연구에서는 자기감정표현기술의 객관적 평가를 위한 가상현실 시스템을 개발하고 정신분열증 환자와 정상인을 대상으로 실험을 진행하였다. 가상현실은 크게 긍정적 상황과 부정적 상황으로 이루어 지는데 집, 카페, 빵집, 길거리 등 다양한 환경에서 가족, 친구, 직장동료 등의 아바타가 실험 참가자에게 말을 건네고 참가자는 적절한 시기에 자신의 감정표현을 하도록 구성하였다. 실험을 하면서 정서 (긍정적 상황 Vs. 부정적 상황)에 따른 자기감정표현에 대한 파라미터로서 아바타가 말하는 동안 참가자가 아바타의 말에 주목을 하는 정도 (아바타가 말하는 동안 참가자가 아바타의 얼굴을 쳐다보는 시간)와 자기감정을 표현을 하는 시간 (아바타의 말이 끝난 후 감정표현을 시작하는 시간과 감정표현시간)과 상대방 아바타를 주목하는 정도 (참가자가 자기감정을 표현하는 중 아바타를 쳐다보는 시간) 등을 측정하였다. 측정결과 정상인이 정신분열병 환자에 비해 아바타를 주목하는 시간이나 자기감정표현을 하는 시간이 더 긴 경향이 있었다. 또한 부정적 상황에서 정신분열병 환자와 정상인 모두가 긍정적 상황에 비해 말하는 아바타에 더 잘 주목하였고, 자기감정을 표현하는 시간도 더 긴 것을 확인 하였다. 따라서 본 연구에서 도출된 파라미터는 실험 참가자의 자기감정표현의 정도를 객관적으로 나타낼 수 있을 것으로 생각된다. 또한 정신분열병 환자의 자기 감정표현능력을 측정하는 도구로 사용될 수 있을 것으로 생각된다.

  • PDF

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

A New Item Recommendation Procedure Using Preference Boundary

  • Kim, Hyea-Kyeong;Jang, Moon-Kyoung;Kim, Jae-Kyeong;Cho, Yoon-Ho
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.81-99
    • /
    • 2010
  • Lately, in consumers' markets the number of new items is rapidly increasing at an overwhelming rate while consumers have limited access to information about those new products in making a sensible, well-informed purchase. Therefore, item providers and customers need a system which recommends right items to right customers. Also, whenever new items are released, for instance, the recommender system specializing in new items can help item providers locate and identify potential customers. Currently, new items are being added to an existing system without being specially noted to consumers, making it difficult for consumers to identify and evaluate new products introduced in the markets. Most of previous approaches for recommender systems have to rely on the usage history of customers. For new items, this content-based (CB) approach is simply not available for the system to recommend those new items to potential consumers. Although collaborative filtering (CF) approach is not directly applicable to solve the new item problem, it would be a good idea to use the basic principle of CF which identifies similar customers, i,e. neighbors, and recommend items to those customers who have liked the similar items in the past. This research aims to suggest a hybrid recommendation procedure based on the preference boundary of target customer. We suggest the hybrid recommendation procedure using the preference boundary in the feature space for recommending new items only. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. The new item recommendation procedure consists of three steps. The first step is analyzing the profile of items, which are represented as k-dimensional feature values. The second step is to determine the representative point of the target customer's preference boundary, the centroid, based on a personal information set. To determine the centroid of preference boundary of a target customer, three algorithms are developed in this research: one is using the centroid of a target customer only (TC), the other is using centroid of a (dummy) big target customer that is composed of a target customer and his/her neighbors (BC), and another is using centroids of a target customer and his/her neighbors (NC). The third step is to determine the range of the preference boundary, the radius. The suggested algorithm Is using the average distance (AD) between the centroid and all purchased items. We test whether the CF-based approach to determine the centroid of the preference boundary improves the recommendation quality or not. For this purpose, we develop two hybrid algorithms, BC and NC, which use neighbors when deciding centroid of the preference boundary. To test the validity of hybrid algorithms, BC and NC, we developed CB-algorithm, TC, which uses target customers only. We measured effectiveness scores of suggested algorithms and compared them through a series of experiments with a set of real mobile image transaction data. We spilt the period between 1st June 2004 and 31st July and the period between 1st August and 31st August 2004 as a training set and a test set, respectively. The training set Is used to make the preference boundary, and the test set is used to evaluate the performance of the suggested hybrid recommendation procedure. The main aim of this research Is to compare the hybrid recommendation algorithm with the CB algorithm. To evaluate the performance of each algorithm, we compare the purchased new item list in test period with the recommended item list which is recommended by suggested algorithms. So we employ the evaluation metric to hit the ratio for evaluating our algorithms. The hit ratio is defined as the ratio of the hit set size to the recommended set size. The hit set size means the number of success of recommendations in our experiment, and the test set size means the number of purchased items during the test period. Experimental test result shows the hit ratio of BC and NC is bigger than that of TC. This means using neighbors Is more effective to recommend new items. That is hybrid algorithm using CF is more effective when recommending to consumers new items than the algorithm using only CB. The reason of the smaller hit ratio of BC than that of NC is that BC is defined as a dummy or virtual customer who purchased all items of target customers' and neighbors'. That is centroid of BC often shifts from that of TC, so it tends to reflect skewed characters of target customer. So the recommendation algorithm using NC shows the best hit ratio, because NC has sufficient information about target customers and their neighbors without damaging the information about the target customers.