• Title/Summary/Keyword: Cloud Game

Search Result 68, Processing Time 0.024 seconds

Design and Implementation of Application for Monitoring Companion Animals in Smart Devices (반려견 관리를 위한 앱의 설계 및 구현)

  • Kwon, Dae-Wan;Park, Dong-Won
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2016
  • The health of the companion animal is one of the most important factors for the owners. However, many owners are not aware of their companion's obesity condition. Data shows that 40% of dogs are suffering from obesity. This application is designed for and compatible with high-volume-user devices such as Android-based devices. The size of the application is reduced keeping standard data such as weight and vaccination date of species on servers and analyzing and fetching these data when user inquires about. Finally, the application has an added component of community space in order to share the knowledge among the number of users.

Gesture based Natural User Interface for e-Training

  • Lim, C.J.;Lee, Nam-Hee;Jeong, Yun-Guen;Heo, Seung-Il
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.577-583
    • /
    • 2012
  • Objective: This paper describes the process and results related to the development of gesture recognition-based natural user interface(NUI) for vehicle maintenance e-Training system. Background: E-Training refers to education training that acquires and improves the necessary capabilities to perform tasks by using information and communication technology(simulation, 3D virtual reality, and augmented reality), device(PC, tablet, smartphone, and HMD), and environment(wired/wireless internet and cloud computing). Method: Palm movement from depth camera is used as a pointing device, where finger movement is extracted by using OpenCV library as a selection protocol. Results: The proposed NUI allows trainees to control objects, such as cars and engines, on a large screen through gesture recognition. In addition, it includes the learning environment to understand the procedure of either assemble or disassemble certain parts. Conclusion: Future works are related to the implementation of gesture recognition technology for a multiple number of trainees. Application: The results of this interface can be applied not only in e-Training system, but also in other systems, such as digital signage, tangible game, controlling 3D contents, etc.

GPU-based modeling and rendering techniques of 3D clouds using procedural functions (절차적 함수를 이용한 GPU기반 실시간 3D구름 모델링 및 렌더링 기법)

  • Sung, Mankyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.416-422
    • /
    • 2019
  • This paper proposes a GPU-based modeling and rendering of 3D clouds using procedural functions. The formation of clouds is based on modified noise function made with fbm(Fractional Brownian Motion). Those noise values turn into densities of droplets of liquid water, which is a critical parameter for forming the three different types of clouds. At the rendering stage, the algorithm applies the ray marching technique to decide the colors of cloud using density values obtained from the noise function. In this process, all lighting attenuation and scattering are calculated by physically based manner. Once we have the clouds, they are blended on the sky, which is also rendered physically. We also make the clouds moving in the sky by the wind force. All algorithms are implemented and tested on GPU using GLSL.

Case Study of Short Animation with Facial Capture Technology Using Mobile

  • Jie, Gu;Hwang, Juwon;Choi, Chulyoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.56-63
    • /
    • 2020
  • The Avengers film produced by Marvel Comics shows visual effects that were impossible to produce in the past. Companies that produce film special effects were initially equipped with large personnel and equipment, but technology is gradually evolving to be feasible for smaller companies that do not have high-priced equipment and a large workforce. The development of hardware and software is becoming increasingly available to the general public as well as to experts. Equipment and software which were difficult for individuals to purchase before quickly popularized high-performance computers as the game industry developed. The development of the cloud has been the driving force behind software costs. As augmented reality (AR) performance of mobile devices improves, advanced technologies such as motion tracking and face recognition technology are no longer implemented by expensive equipment. Under these circumstances, after implementing mobile-based facial capture technology in animation projects, we have identified the pros and the cons and suggest better solutions to improve the problem.

Technology Trends of Cloud Computing-based Game Streaming (클라우드 컴퓨팅 기반의 게임 스트리밍 기술 동향)

  • Lim, C.G.;Kim, S.S.;Kim, K.I.;Won, J.H.;Park, C.J.
    • Electronics and Telecommunications Trends
    • /
    • v.26 no.1
    • /
    • pp.47-56
    • /
    • 2011
  • 클라우드 컴퓨팅 기술의 탄생과 다양한 이동단말기, 디지털 TV의 보급은 컴퓨터 게임과 같은 고품질 3D 애플리케이션을 이동단말기나 디지털 TV에서도 사용하고자 하는 사용자의 욕구를 불러일으키고 있다. 고가의 고성능 장비를 갖춘 서버에서 3D 애플리케이션을 구동하고 사용자는 저가의 원격 단말기를 사용하여 서버에 초고속 인터넷을 통하여 접속한다면 고품질 3D 애플리케이션을 별도의 추가 비용 없이 사용할 수 있다는 장점이 있다. 본 논문에서는 클라우드 컴퓨팅 기반의 게임 스트리밍 기술을 정의하고, 가능성을 고찰하고자 한다. 아울러, 현재 개발 완료된 또는 개발중인 기술에 대해서 핵심 기술, 장단점을 분석하고자 한다.

  • PDF

Offloading Framework for Legacy Application in Mobile Cloud Environments (모바일 클라우드 환경에서 레거시 어플리케이션을 위한 오프로딩 프레임워크)

  • Kim, Soon-Gohn;Yousafzai, Abdullah;Ko, Kwang-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.179-180
    • /
    • 2016
  • 최근까지 모바일 디바이스와 고성능 클라우드 서버는 동일한 DVM 실행시간 환경에서 오프로딩을 통해 모바일 디바이스의 어플리케이션에 대해 실행속도 개선하려는 연구가 진행되고 있다. 본 논문에서는 안드로이드 실행시간 환경이 네이티브 어플리케이션을 지원하는 ART로 완전하게 전환되는 상황에서 DVM에서 실행되고 있는 모바일 레거시 어플리케이션에 대해 모바일 디바이스의 복잡한 계산 부담을 줄여 실행속도를 향상시고, 이를 통해 배터리 소모를 감소시키는 프로세스 단위 오프로딩 프레임워크에 대한 설계 내용을 제시한다.

Implementation of Metaverse Virtual World using Unity Game Engine (유니티 게임엔진을 활용한 메타버스 가상세계 구현)

  • Gang In Lee;Seok Ho Han;Yong-Hwan Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.2
    • /
    • pp.120-127
    • /
    • 2023
  • Recently, metaverse has attracted great attention worldwide with the development of related technologies and the demand for on-tact systems. The ideal metaverse should constitute a virtual world more similar to the realistic society with physical interactions. However, there are many constraints when we construct a virtual world using the existing commercialized metaverse platform. In this paper, we design and implement a university campus-based metaverse which minimizes the constraints, and create a virtual environment maps very similar to the real-world using Unity engine, Photon cloud and Playfab SDK for multi-user accessible to virtual world as a personal avatar. Also, this work includes attractive interaction based on exchange between users. Lastly, we illustrate our implemented metaverse works on Android phone, and it works without difficulty in terms of performance.

  • PDF

Automatic Pose similarity Computation of Motion Capture Data Through Topological Analysis (위상분석을 통한 모션캡처 데이터의 자동 포즈 비교 방법)

  • Sung, Mankyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1199-1206
    • /
    • 2015
  • This paper introduces an algorithm for computing similarity between two poses in the motion capture data with different scale of skeleton, different number of joints and different joint names. The proposed algorithm first performs the topological analysis on the skeleton hierarchy for classifying the joints into more meaningful groups. The global joints positions of each joint group then are aggregated into a point cloud. The number of joints and their positions are automatically adjusted in this process. Once we have two point clouds, the algorithm finds an optimal 2D transform matrix that transforms one point cloud to the other as closely as possible. Then, the similarity can be obtained by summing up all distance values between two points clouds after applying the 2D transform matrix. After some experiment, we found that the proposed algorithm is able to compute the similarity between two poses regardless of their scale, joint name and the number of joints.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Implementation of AR Remote Rendering Techniques for Real-time Volumetric 3D Video

  • Lee, Daehyeon;Lee, Munyong;Lee, Sang-ha;Lee, Jaehyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.90-97
    • /
    • 2020
  • Recently, with the growth of mixed reality industrial infrastructure, relevant convergence research has been proposed. For real-time mixed reality services such as remote video conferencing, the research on real-time acquisition-process-transfer methods is required. This paper aims to implement an AR remote rendering method of volumetric 3D video data. We have proposed and implemented two modules; one, the parsing module of the volumetric 3D video to a game engine, and two, the server rendering module. The result of the experiment showed that the volumetric 3D video sequence data of about 15 MB was compressed by 6-7%. The remote module was streamed at 27 fps at a 1200 by 1200 resolution. The results of this paper are expected to be applied to an AR cloud service.