• Title/Summary/Keyword: 가상의

Search Result 12,350, Processing Time 0.044 seconds

Effect of the Affordance Characteristics of VR Game UI on the User Experience (VR 게임 UI의 어포던스 특성이 사용자 경험에 미치는 영향)

  • Park, Jun-Hong;Lee, Junsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.252-258
    • /
    • 2020
  • Advances in IT technologies are developing VR content technologies that provide five senses information to users and interact with them. These VR content technologies are widely used by users not only for time and space limitations but also for providing immersion experiences. VR contents are contents that allow users to experience images that are played on the screen through five senses such as augmented reality, virtual reality, and holograms as well as visuals. VR games are also becoming more diverse in interfaces for the interaction of users with VR games. This study recognized the importance of the interface and analyzed the impact of the application characteristics of VR game UI on user experience and satisfaction from the user perspective. Research shows that VR game UI interacts with user experience and satisfaction. This appears to affect user experience based on how well people using VR game UI can understand and utilize the characteristics and functions of UI.

The Characteristics of Affective Turn in Media Arts through Relational Aesthetics -Centered on the Digital Works of TeamLab- (관계미학을 통한 미디어아트의 정동적 전회의 특성 -TeamLab의 디지털 작품을 중심으로-)

  • Xiao, Lin;Lee, Hyun-Seok
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.323-337
    • /
    • 2021
  • This study will attempt to analyze media art and discuss its main characteristics by using the concept based on Relational Aesthetics 'Affective Turn' as a basis of the theory. In addition, this study has some theoretical and practical implications, both in terms of the research and analysis of artworks and the structure development of art theories and aesthetics. To conduct the research, I have gone through a literature review on previous studies related to media art and Relational Aesthetics. Then, I have conducted a case study on the media art of TeamLab. This study shows that from the perspective of Relational Aesthetics, media art shows unique characteristics such as borderless and shareability. Moreover, it can allow the audience to actually 'feel' the relationship and integration between various objects. I hopethat this research could be used as a solid basis for future research and helpstrengthen the interaction between modern art and the public.

Domestic Trend Analysis of Virtual Reality Therapy for the Treatment Anxiety Disorders (불안장애에 대한 가상현실치료 국내동향분석)

  • Cheong, Moon Joo;Kim, Jeesu;Lyu, Yeoung-Su;Kang, Hyung Won
    • Journal of Oriental Neuropsychiatry
    • /
    • v.31 no.4
    • /
    • pp.279-288
    • /
    • 2020
  • Objectives: Many fields have changed since covid-19, psychotherapy being no exception. With the pandemic associated increase in untact treatment, interest in virtual reality exposure therapy has also increased. The aim of study was to analyze recent literature using virtual reality therapy for the treatment of anxiety disorders. Methods: We searched five databases from dates between October 1 to November 1, 2020. We selected articles related to the treatment of anxiety disorders using virtual reality therapy and analyzed the trend of that, not thesis but domestic articles. Results: There were 6 RCT studies and 3 were case reports where, based on the DSM-4, the participants presented with anxiety disorders including 2 with presentation anxiety, 1 heterosexual anxiety, 1 test anxiety, 1 social anxiety, 1 dental anxiety, 2 Acrophobia, and 1 social phobia. Treatment sessions varied from 1 session to 18 sessions, but 5 studies conducted 4 sessions, and all studies attempted virtual reality exposure for 30-minute time periods. 8 studies used HMD as the VR device and 1 study did not report a device. Conclusions: Anxiety disorders treated using virtual reality included speech anxiety and acrophobia. Median treatment session number was 4 and sessions were less than 30 minutes. The most common VR device used was an HMD. VR psychotherapy showed limitations relating to patient experience including cyber sickness and a lack of immersion. In addition, most of the studies were conducted with patients who visited hospitals utilizing Western medical practices. Currently, virtual reality therapy (VRT) intervention in oriental medicine is lacking. The lack of research in this area suggests analyzing data from VR psychotherapy in oriental medicine could provide novel and useful information.

Image-based CAPTCHA Using Multi-Image Composition and Its Secure Operation (복수의 이미지를 합성하여 사용하는 이미지 기반의 캡차와 이를 위한 안전한 운용 방법)

  • Kang, Jeon-Il;Maeng, Young-Je;Kim, Koon-Soon;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.153-166
    • /
    • 2008
  • According to the growth of the internet and the usage of software agents, the CAPTCHA that is a method for taking apart humans and computers has been widely deployed and used. As the results of many research activities, the CAPTCHA, which is spoken for a distorted image material including random text, has known to be easily breakable via artificial intelligence techniques. As one of alternatives for those text-based CAPTCHAs, methods using photos are concerned and various image-based CAPTCHAs are suggested. However, image-based CAPTCHAs still have some problems. In this paper, we discuss what are the problems in each image-based CAPTCHA and propose a new image-based CAPTCHA using image composition as the solution of those problems. Furthermore, for the secure operation of the CAPTCHA, we suggest a communication protocol that works without the virtual session and consider possible security and usability problems in the protocol.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Implementation of RSA Exponentiator Based on Radix-$2^k$ Modular Multiplication Algorithm (Radix-$2^k$ 모듈라 곱셈 알고리즘 기반의 RSA 지수승 연산기 설계)

  • 권택원;최준림
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.35-44
    • /
    • 2002
  • In this paper, an implementation method of RSA exponentiator based on Radix-$2^k$ modular multiplication algorithm is presented and verified. We use Booth receding algorithm to implement Radix-$2^k$ modular multiplication and implement radix-16 modular multiplier using 2K-byte memory and CSA(carry-save adder) array - with two full adder and three half adder delays. For high speed final addition we use a reduced carry generation and propagation scheme called pseudo carry look-ahead adder. Furthermore, the optimum value of the radix is presented through the trade-off between the operating frequency and the throughput for given Silicon technology. We have verified 1,024-bit RSA processor using Altera FPGA EP2K1500E device and Samsung 0.3$\mu\textrm{m}$ technology. In case of the radix-16 modular multiplication algorithm, (n+4+1)/4 clock cycles are needed and the 1,024-bit modular exponentiation is performed in 5.38ms at 50MHz.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.

A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization (반가상화 환경 Guest OS 보호를 위한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.659-666
    • /
    • 2012
  • Recently, cloud computing service has become a rising issue in terms of utilizing sources more efficiently and saving costs. However, the service still has some limitations to be popularized because it lacks the verification towards security safety. In particular, the possibility to induce Denial of service is increasing as it is used as Zombie PC with exposure to security weakness of Guest OS's. This paper suggests how cloud system, which is implemented by Xen, detects intrusion caused by Denial of service using hypercall. Through the experiment, the method suggested by K-means and EM shows that two data, collected for 2 mins, 5 mins, 10mins and 20mins each, are distinguished 90% when collected for 2mins and 5mins while collected over 10mins are distinguished 100% successfully.

Particle Dispersion Model Speed Improvement and Evaluation for Quick Reaction to Pollutant Accidents (신속한 오염사고 대응을 위한 입자 분산 모형의 속도 개선 및 평가)

  • Shin, Jaehyun;Seong, Hoje;Park, Inhwan;Rhee, Dong Sop
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.537-546
    • /
    • 2020
  • This study deals with the development and improvement of a particle dispersion model for quick response to water pollutant accidents. The developed model is based on the shear dispersion theory where vertical mixing is done by step by step mixing by vertical and molecular diffusion algorithm. For the quick response to chemical accidents, an algorithm for multi-core modeling for the particle dispersion model is applied. After the application of multi-core operation using OpenMP directives to the model, the relation for the calculation time and particle size were determined along with the number of cores used for parallel programming to determine the model time for chemical accident responses. The results showed the adequate conditions for the modeling of chemical accidents for quick response and to increase the applicability of the model.