• Title/Summary/Keyword: virtual training system

Search Result 331, Processing Time 0.03 seconds

BLE-based Indoor Positioning System design using Neural Network (신경망을 이용한 BLE 기반 실내 측위 시스템 설계)

  • Shin, Kwang-Seong;Lee, Heekwon;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.75-80
    • /
    • 2021
  • Positioning technology is performing important functions in augmented reality, smart factory, and autonomous driving. Among the positioning techniques, the positioning method using beacons has been considered a challenging task due to the deviation of the RSSI value. In this study, the position of a moving object is predicted by training a neural network that takes the RSSI value of the receiver as an input and the distance as the target value. To do this, the measured distance versus RSSI was collected. A neural network was introduced to create synthetic data from the collected actual data. Based on this neural network, the RSSI value versus distance was predicted. The real value of RSSI was obtained as a neural network for generating synthetic data, and based on this value, the coordinates of the object were estimated by learning a neural network that tracks the location of a terminal in a virtual environment.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Development of Emotional Expression Assessment System and a Clinical Pilot Test (감정표현 평가 시스템 개발 및 실험적 적용)

  • Han, Ki-Wan;Kim, Kwang-Uk;Ku, Jeong-Hun;Jang, Hee-Jeong;Park, Jun-Young;Kim, In-Young;Kim, Jae-Jin;Kim, Chan-Hyung;Kim, Sun-I.
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.1099-1106
    • /
    • 2006
  • 정신질환자들은 자기감정을 표현하는 능력의 결손을 보인다. 이러한 자기 감정표현기술은 정신질환자들을 위한 사회기술훈련 (Social Skill Training) 과정 중 하나로서 정상적인 사회생활로의 복귀를 위해 반드시 필요하다. 지금까지의 자기감정표현 훈련 및 평가 방법은 치료자 능력의 차이에 따른 주관적 판단이 개입될 수 있다는 문제점을 가지고 있다. 가상현실 (Virtual Reality)은 컴퓨터를 이용한 최신의 방법으로, 최근 자폐증이나 공포증 등의 정신질환 분야에도 적용되고 있다. VR 을 사용하면 상호작용을 할 수 있고, 다양한 환경과 자극을 제시할 수 있으며, 3 차원 랜더링을 통해 몰입감을 제공할 수 있다. 또한 저장된 파라미터들을 바탕으로 객관적 판단을 할 수 있는 기준을 제시할 수 있으며, 안전하고 시간과 공간적 제약이 적은 환경 내에서 과제를 수행할 수 있다. 이에 본 연구에서는 자기감정표현기술의 객관적 평가를 위한 가상현실 시스템을 개발하고 정신분열증 환자와 정상인을 대상으로 실험을 진행하였다. 가상현실은 크게 긍정적 상황과 부정적 상황으로 이루어 지는데 집, 카페, 빵집, 길거리 등 다양한 환경에서 가족, 친구, 직장동료 등의 아바타가 실험 참가자에게 말을 건네고 참가자는 적절한 시기에 자신의 감정표현을 하도록 구성하였다. 실험을 하면서 정서 (긍정적 상황 Vs. 부정적 상황)에 따른 자기감정표현에 대한 파라미터로서 아바타가 말하는 동안 참가자가 아바타의 말에 주목을 하는 정도 (아바타가 말하는 동안 참가자가 아바타의 얼굴을 쳐다보는 시간)와 자기감정을 표현을 하는 시간 (아바타의 말이 끝난 후 감정표현을 시작하는 시간과 감정표현시간)과 상대방 아바타를 주목하는 정도 (참가자가 자기감정을 표현하는 중 아바타를 쳐다보는 시간) 등을 측정하였다. 측정결과 정상인이 정신분열병 환자에 비해 아바타를 주목하는 시간이나 자기감정표현을 하는 시간이 더 긴 경향이 있었다. 또한 부정적 상황에서 정신분열병 환자와 정상인 모두가 긍정적 상황에 비해 말하는 아바타에 더 잘 주목하였고, 자기감정을 표현하는 시간도 더 긴 것을 확인 하였다. 따라서 본 연구에서 도출된 파라미터는 실험 참가자의 자기감정표현의 정도를 객관적으로 나타낼 수 있을 것으로 생각된다. 또한 정신분열병 환자의 자기 감정표현능력을 측정하는 도구로 사용될 수 있을 것으로 생각된다.

  • PDF

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

A New Item Recommendation Procedure Using Preference Boundary

  • Kim, Hyea-Kyeong;Jang, Moon-Kyoung;Kim, Jae-Kyeong;Cho, Yoon-Ho
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.81-99
    • /
    • 2010
  • Lately, in consumers' markets the number of new items is rapidly increasing at an overwhelming rate while consumers have limited access to information about those new products in making a sensible, well-informed purchase. Therefore, item providers and customers need a system which recommends right items to right customers. Also, whenever new items are released, for instance, the recommender system specializing in new items can help item providers locate and identify potential customers. Currently, new items are being added to an existing system without being specially noted to consumers, making it difficult for consumers to identify and evaluate new products introduced in the markets. Most of previous approaches for recommender systems have to rely on the usage history of customers. For new items, this content-based (CB) approach is simply not available for the system to recommend those new items to potential consumers. Although collaborative filtering (CF) approach is not directly applicable to solve the new item problem, it would be a good idea to use the basic principle of CF which identifies similar customers, i,e. neighbors, and recommend items to those customers who have liked the similar items in the past. This research aims to suggest a hybrid recommendation procedure based on the preference boundary of target customer. We suggest the hybrid recommendation procedure using the preference boundary in the feature space for recommending new items only. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. The new item recommendation procedure consists of three steps. The first step is analyzing the profile of items, which are represented as k-dimensional feature values. The second step is to determine the representative point of the target customer's preference boundary, the centroid, based on a personal information set. To determine the centroid of preference boundary of a target customer, three algorithms are developed in this research: one is using the centroid of a target customer only (TC), the other is using centroid of a (dummy) big target customer that is composed of a target customer and his/her neighbors (BC), and another is using centroids of a target customer and his/her neighbors (NC). The third step is to determine the range of the preference boundary, the radius. The suggested algorithm Is using the average distance (AD) between the centroid and all purchased items. We test whether the CF-based approach to determine the centroid of the preference boundary improves the recommendation quality or not. For this purpose, we develop two hybrid algorithms, BC and NC, which use neighbors when deciding centroid of the preference boundary. To test the validity of hybrid algorithms, BC and NC, we developed CB-algorithm, TC, which uses target customers only. We measured effectiveness scores of suggested algorithms and compared them through a series of experiments with a set of real mobile image transaction data. We spilt the period between 1st June 2004 and 31st July and the period between 1st August and 31st August 2004 as a training set and a test set, respectively. The training set Is used to make the preference boundary, and the test set is used to evaluate the performance of the suggested hybrid recommendation procedure. The main aim of this research Is to compare the hybrid recommendation algorithm with the CB algorithm. To evaluate the performance of each algorithm, we compare the purchased new item list in test period with the recommended item list which is recommended by suggested algorithms. So we employ the evaluation metric to hit the ratio for evaluating our algorithms. The hit ratio is defined as the ratio of the hit set size to the recommended set size. The hit set size means the number of success of recommendations in our experiment, and the test set size means the number of purchased items during the test period. Experimental test result shows the hit ratio of BC and NC is bigger than that of TC. This means using neighbors Is more effective to recommend new items. That is hybrid algorithm using CF is more effective when recommending to consumers new items than the algorithm using only CB. The reason of the smaller hit ratio of BC than that of NC is that BC is defined as a dummy or virtual customer who purchased all items of target customers' and neighbors'. That is centroid of BC often shifts from that of TC, so it tends to reflect skewed characters of target customer. So the recommendation algorithm using NC shows the best hit ratio, because NC has sufficient information about target customers and their neighbors without damaging the information about the target customers.

A Study on the Fire Prevention Activities and Suppression Measures of Utility-Pipe Conduit (지하공동구 화재예방활동 및 진압대책에 관한 연구)

  • Lee, Jung-Il
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Utility-Pipe Conduit is, Housing and city effectively accommodate what they absolutely need power, communications, gas, pipeline, water supply, drainage, energy facilities etc, according to expansion of urban infrastructure are derived, several ways to solve problems in, collection facilities in place are maintained and managed facility. If Utility-Pipe Conduit is damaged, as well as national security, because their impact on society as a whole, by introducing large vulnerability in the fire prevention activities and suppression measures and disaster for our situation by introducing measures, comprehensive analysis of the fire risk, it shall establish fire prevention activities and suppression through analysis of Utility-Pipe Conduit design, institutional issues, the problem of fire protection facilities, fire spread phenomenon etc. Because of Utility-Pipe Conduit is an enclosed place, so incomplete combustion due to lack of oxygen supply that there are problem such dark smoke, carbon monoxide etc, toxic combustion products and heat generation and visual impairment is an issue difficult to enter. As well as fire prevention activities, the fire In light of the particularity of the under ground than above ground fire, so this phenomenon is weak fire fighting that fire to become effective fire fighting tactics, basically it is necessary difficulty softening, non-burn softening and prevent combustion expansion of the cable is installed on the Utility-Pipe Conduit, having to considering the specificity of the response command system and relevant organizations to establish an on-site, Structural identification and other information gathering required to record of Response agencies, keep air conditioning system 24 hours and strengthening Virtual Total Training of Response agen

Simulation-based Education Model for PID Control Learning (PID 제어 학습을 위한 시뮬레이션 기반의 교육 모델)

  • Seo, Hyeon-Ho;Kim, Jae-Woong;Park, Seong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.286-293
    • /
    • 2022
  • Recently, the importance of elemental technologies constituting smart factories is increasing due to the 4th Industrial Revolution, and simulation is widely used as a tool to learn these technologies. In particular, PID control is an automatic control technique used in various fields, and most of them analyze mathematical models in certain situations or research on application development with built-in controllers. In actual educational environment requires PID simulator training as well as PID control principles. In this paper, we propose a model that enables education and practice of various PID controls through 3D simulation. The proposed model implemented virtual balls and Fan and implemented PID control by configuring a system so that the force can be lifted by the air pressure generated in the Fan. At this time, the height of the ball was expressed in a graph according to each gain value of the PID controller and then compared with the actual system, and through this, satisfactory results sufficiently applicable to the actual class were confirmed. Through the proposed model, it is expected that the rapidly increasing elemental technology of smart factories can be used in various ways in a remote classroom environment.

Cooperative Multi-Agent Reinforcement Learning-Based Behavior Control of Grid Sortation Systems in Smart Factory (스마트 팩토리에서 그리드 분류 시스템의 협력적 다중 에이전트 강화 학습 기반 행동 제어)

  • Choi, HoBin;Kim, JuBong;Hwang, GyuYoung;Kim, KwiHoon;Hong, YongGeun;Han, YounHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.171-180
    • /
    • 2020
  • Smart Factory consists of digital automation solutions throughout the production process, including design, development, manufacturing and distribution, and it is an intelligent factory that installs IoT in its internal facilities and machines to collect process data in real time and analyze them so that it can control itself. The smart factory's equipment works in a physical combination of numerous hardware, rather than a virtual character being driven by a single object, such as a game. In other words, for a specific common goal, multiple devices must perform individual actions simultaneously. By taking advantage of the smart factory, which can collect process data in real time, if reinforcement learning is used instead of general machine learning, behavior control can be performed without the required training data. However, in the real world, it is impossible to learn more than tens of millions of iterations due to physical wear and time. Thus, this paper uses simulators to develop grid sortation systems focusing on transport facilities, one of the complex environments in smart factory field, and design cooperative multi-agent-based reinforcement learning to demonstrate efficient behavior control.

Proposal for Possibility of Using Metaverse in the 'Earth and Space' Area of Pre-service Elementary Teachers' (초등예비교사의 '지구와 우주' 영역에서 메타버스 활용가능성 제안)

  • Lee, Yong-Seob
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.14 no.3
    • /
    • pp.248-256
    • /
    • 2021
  • The purpose of this study is to investigate the perception of pre-service elementary teachers on the educational approach to metaverse. Questions about metaverse were asked to 71 pre-service elementary teachers who were taking the course 'Study of Textbooks in Elementary Science II'. The results of analyzing the contents of the questions are as follows. The results and conclusions were presented through numerical analysis and static analysis based on the responses to questions presented using the university's LMS system. First, the level of understanding of the metaverse of pre-service elementary teachers is very high. Pre-service elementary teachers, as the MZ generation, are already living in a very fast IT environment that can be the basis of the metaverse, so it would have been helpful to understand the metaverse. Second, the need for the metaverse of pre-service elementary teachers is very high. There was a tendency to think that the perception of pre-service elementary teachers is because the metaverse has many factors that can provide higher quality education beyond the current educational environment. Third, in the question of applicability exploration in the 'Earth and Space' domain of Pre-service elementary teachers, there have been few cases in which instructional design was planned based on instructional design principles. Based on these results, if the possibility of metaverse application is proposed in the 'Earth and Space' domain, educational contents using virtual space that can transcend time and space will be very necessary. Based on these results, suggestions are made as follows. First, educational content incorporating the metaverse technique based on instructional design should be developed and utilized. Second, financial support should be provided so that the metaverse can be implemented in the educational environment. Third, it is necessary to provide training opportunities for teachers (including Pre-service elementary teachers) to give lectures on metaverse.