• Title/Summary/Keyword: 게임활용

Search Result 1,909, Processing Time 0.03 seconds

Kiosk training strategies based on IT educational App for older adults

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.239-245
    • /
    • 2021
  • Due to the fourth industrial revolution and the Corona19, the availability of digital devices such as kiosks is a matter directly related to survival for older adults with digital divide. This paper analyzes the problems of existing information service education for older adults and proposes an IT education strategy tailored to aging and life cycle of older adults. The proposed in this study is an educational application-based IT training method that supports repetitive learning regardless of time and place, developing kiosk function as a functional game-type educational application and experimenting with post-training effectiveness. The research method proposed UI usability evaluation frame for older adults, and developed educational applications based on proposed evaluation frame, and conducted kiosk education. As a result of the experiment, the mission success rate after using the IT application was 80.6%, which is a 55.1%P improvement compared to the pre-use(25.5%). This study confirmed that the proposed education for older adults is a way to overcome the limitations of existing IT education in the current situation.

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

Types of Virtual Reality-based Safety Education Contents (가상현실 기반 안전교육 콘텐츠 유형 연구)

  • Chang, Sun-Hee;Chang, Hyo-Jin;Kim, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.434-445
    • /
    • 2021
  • With the development of realistic content technology and related infrastructure, interest in the use of virtual reality content is growing. Accordingly, in the field of safety education, more and more cases of producing virtual reality-based safety education (VR safety education) contents such as experiencing disaster situations realistically by supplementing the shortcomings of existing lecture-style education. This study looked at the characteristics and effects of VR safety education compared to the existing safety education, and analyzed 104 VR safety education contents produced and disclosed to date into nine classifications based on content and form. Based on the degree of relevance between items and the two axes of 'interactionability' and 'vividness of the environment', VR safety education contents could be categorized into three types: tangible lecture type, simulation type, and game type. Through this study, we hope to contribute to the planning and production of quality VR safety education contents by considering the purpose of safety education and the characteristics of types with the expected effects.

Customized Serverless Android Malware Analysis Using Transfer Learning-Based Adaptive Detection Techniques (사용자 맞춤형 서버리스 안드로이드 악성코드 분석을 위한 전이학습 기반 적응형 탐지 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.433-441
    • /
    • 2021
  • Android applications are released across various categories, including productivity apps and games, and users are exposed to various applications and even malware depending on their usage patterns. On the other hand, most analysis engines train using existing datasets and do not reflect user patterns even if periodic updates are made. Thus, the detection rate for known malware is high, while types of malware such as adware are difficult to detect. In addition, existing engines incur increased service provider costs due to the cost of server farm, and the user layer suffers from problems where availability and real-timeness are not guaranteed. To address these problems, we propose an analysis system that performs on-device malware detection through transfer learning, which requires only one-time communication with the server. In addition, The system has a complete process on the device, including decompiler, which can distribute the load of the server system. As an evaluation result, it shows 90.3% accuracy without transfer learning, while the model transferred with adware catergories shows 95.1% of accuracy, which is 4.8% higher compare to original model.

Q-Learning Policy and Reward Design for Efficient Path Selection (효율적인 경로 선택을 위한 Q-Learning 정책 및 보상 설계)

  • Yong, Sung-Jung;Park, Hyo-Gyeong;You, Yeon-Hwi;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.72-77
    • /
    • 2022
  • Among the techniques of reinforcement learning, Q-Learning means learning optimal policies by learning Q functions that perform actionsin a given state and predict future efficient expectations. Q-Learning is widely used as a basic algorithm for reinforcement learning. In this paper, we studied the effectiveness of selecting and learning efficient paths by designing policies and rewards based on Q-Learning. In addition, the results of the existing algorithm and punishment compensation policy and the proposed punishment reinforcement policy were compared by applying the same number of times of learning to the 8x8 grid environment of the Frozen Lake game. Through this comparison, it was analyzed that the Q-Learning punishment reinforcement policy proposed in this paper can significantly increase the learning speed compared to the application of conventional algorithms.

An Analysis of Uncanny Valley Effects in Virtual Character Graphics -Focusing on the character modeling of Unreal Engine Marketplace- (가상 캐릭터 그래픽에서의 언캐니 밸리 효과 분석 -언리얼 엔진 마켓플레이스의 캐릭터 모델링을 중심으로-)

  • Ji-Won, Seo;Jung-Yi, Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.1-6
    • /
    • 2023
  • Uncanny Valley is a theory proposed by Japanese robot engineer Masahiro Mori in 1970, and refers to the point where the likability drops sharply when the appearance of a robot becomes very similar to a human being without a fully equipped robot. In this study, the theory of existing literature, related papers, and experimental data were analyzed to examine the Uncanny Valley effect that affects character design. The purpose of this study is to analyze whether the Uncanny Valley effect is applied to modeling virtual characters distributed in the Unreal Engine Marketplace. To this end, 15 characters were selected based on the similarity with humans in the Marketplace of the Unreal Engine, and similarity with humans and likability were investigated and analyzed. As a result of the experiment, it was confirmed that the Uncanny Valley effect was similarly applied to virtual character modeling, and through this, guidelines for the use of characters by indie game developers or individual developers using Unreal engines were presented. In addition, through result analysis, we tried to examine the direction to be pursued when designing characters.

A Study on the Visual Attention of Game Broadcast Real-time Review Using Eye Tracking: Focusing on Mobile Platform (아이트래킹을 활용한 개인 게임방송 실시간 댓글의 시각적 주의에 관한 연구: 모바일 플랫폼을 중심으로)

  • Yin, Shuo-Han;Wang, Jin-Nan;Hwang, Mi-Kyung;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.733-739
    • /
    • 2022
  • The study investigated the users' functional requirement, degree of acceptance and preference of game broadcast real-time review .Secondly it comparatively analyzed the types and locations of game broadcast real-time review through eye tracking tech. The results show that users have high functional requirements and high acceptance for game broadcast real-time review but their preference has no significant correlation with the feature. Among the types of game broadcast real-time review the type with translucent text bubble took the highest visual attention. The above shows that the users' visual behavior has the tendency of special style. The visual attention analysis results of different types and locations of game broadcast real-time review in the study can play a guiding role in the interface design of real-time review feature in the future.

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

The Combat Effectiveness Analysis of Attack Helicopter Using Simulation and AHP (시뮬레이션 및 AHP기법을 이용한 공격헬기 전투효과 분석)

  • Lee, Jae-Moon;Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.63-70
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can measure the combat effectiveness of attack helicopter which Korea army will be operating in the near future. To measure the combat effectiveness, firstly, we use a wargame model, AAsim (Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field, secondly we use an Analytic Hierarchy Process by opinion of experts. For simulation and AHP, we consider anti armored corps operation reflecting attack helicopter's combat effectiveness. As a result of this study, the combat effectiveness per each attack helicopter can be measured and this combat effectiveness is useful for reasonable decision making such as selection helicopter type, quantity when acquiring new weapon system.