• Title/Summary/Keyword: virtual class

Search Result 258, Processing Time 0.023 seconds

Dynamic Performance Analyzing of In-wheel Vehicle considering the Real Driving Conditions and Development of Derivation System for Applying Dynamometer Using Drive Motor's Dynamic Load Torque (실차 주행 조건을 고려한 인휠 차량 거동 해석 및 동력 시험계 부하 토크 인가를 위한 구동 모터의 동적 부하 도출시스템 개발)

  • Son, Seungwan;Kim, Kiyoung;Cha, Suk Won;Lim, Won Sik;Kim, Jungyun
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.24 no.3
    • /
    • pp.294-301
    • /
    • 2016
  • This paper discusses about analyzing in-wheel vehicle's dynamic motion and load torque. Since in-wheel vehicle controls each left and right driving wheels, it is dangerous if vehicle's wheels are not in a cooperative control. First, this study builds the main wheel control logic using PID control theory and evaluates the stability. Using Carsim-Matlab/Simulink, vehicle dynamic motion is simulated in virtual 3D driving road. Through this, in-wheel vehicle's driving performance can be analyzed. The target vehicle is a rear-wheel drive in D-class sedan. Second, by using the first In-wheel vehicle's performance results, it derivate the drive motor's dynamic load torque for applying the dynamometer. Extracted load torque impute to dynamometer's load motor, linear experiment in dynamometer can replicated the 3-D road driving status. Also it, will be able to evaluate the more accurate performance analysis and stability, as a previous step of actual vehicle experiment.

The Suggestion of the Korean Folk Picture Image for Game Graphic (한국 풍속화의 도상을 활용한 게임그래픽의 제안)

  • Kim, Boo-Ja
    • Journal of Korea Game Society
    • /
    • v.2 no.2
    • /
    • pp.66-71
    • /
    • 2002
  • The common lives of the korean people reflect the feeling and emotion of their own world irrespective of rank and class. The folk picture which has the humor, feeling of the korean people, has been with the whole nation throughout times. Therefore it reveals the imaged tradition, recordable character and the truth. It is the folk picture that is the first stream of the game graphic. Because it has its own world built by timeless culture, philosophy, religion, art, and so on. When the game is understood as the reappearance of virtual truth, and the whole new world of the game players, it is really necessary to develop the game graphic with creative plans and artistic value. It is the time to focus on the korean folk picture as a new sources of the contents. Then it is obvious to solidfy the groundwork of the game industry if people at all ages play games as a result of reinterpreting and developing technical tools for the korean folk picture for the present age.

  • PDF

The Development of Electromagnetic Field Analysis Software for Virtual Training (가상 교육용 전자장 해석 프로그램 개발)

  • Wee, Sang Bong;Kim, Ki Beom
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.55-60
    • /
    • 2010
  • We usually encounter Electro-magnetics phenomenons and only feel some part of that, but it is hard to feel it visually. Moreover understanding physically and quantitatively is not a easy work. These electrostatic field theory, magnetostatic field theory and interchange magnetic field theory combined with electromagnetic field are formulated experimentally and theoretically by James Clerk Maxwell in 1873. Electromagnetic field takes electro-magnetic phenomenons as a expansion of formula originated in Maxwell equations. Since this is based on expansion of formula, it is hard to understand for many students not only middle school and high school students learning it at the first time but also college students studying physics as a elementary class and even majors in electromagnetic field. The program is developed as a visual aid to cope with these problems, and even to deal with complex problem to estimate solution using numerical method.

  • PDF

A simple iterative independent component analysis algorithm for vibration source signal identification of complex structures

  • Lee, Dong-Sup;Cho, Dae-Seung;Kim, Kookhyun;Jeon, Jae-Jin;Jung, Woo-Jin;Kang, Myeng-Hwan;Kim, Jae-Ho
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.7 no.1
    • /
    • pp.128-141
    • /
    • 2015
  • Independent Component Analysis (ICA), one of the blind source separation methods, can be applied for extracting unknown source signals only from received signals. This is accomplished by finding statistical independence of signal mixtures and has been successfully applied to myriad fields such as medical science, image processing, and numerous others. Nevertheless, there are inherent problems that have been reported when using this technique: instability and invalid ordering of separated signals, particularly when using a conventional ICA technique in vibratory source signal identification of complex structures. In this study, a simple iterative algorithm of the conventional ICA has been proposed to mitigate these problems. The proposed method to extract more stable source signals having valid order includes an iterative and reordering process of extracted mixing matrix to reconstruct finally converged source signals, referring to the magnitudes of correlation coefficients between the intermediately separated signals and the signals measured on or nearby sources. In order to review the problems of the conventional ICA technique and to validate the proposed method, numerical analyses have been carried out for a virtual response model and a 30 m class submarine model. Moreover, in order to investigate applicability of the proposed method to real problem of complex structure, an experiment has been carried out for a scaled submarine mockup. The results show that the proposed method could resolve the inherent problems of a conventional ICA technique.

A Study on Feature-Based Multi-Resolution Modelling - Part II: System Implementation and Criteria for Level of Detail (특징형상기반 다중해상도 모델링에 관한 연구 - Part II: 시스템 구현 및 상세수준 판단기준)

  • Lee K.Y.;Lee S.H.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.6
    • /
    • pp.444-454
    • /
    • 2005
  • Recently, the requirements of multi-resolution models of a solid model, which represent an object at multiple levels of feature detail, are increasing for engineering tasks such as analysis, network-based collaborative design, and virtual prototyping and manufacturing. The research on this area has focused on several topics: topological frameworks for representing multi-resolution solid models, criteria for the level of detail (LOD), and generation of valid models after rearrangement of features. As a solution to the feature rearrangement problem, the new concept of the effective zone of a feature is introduced in the former part of the paper. In this paper, we propose a feature-based non-manifold modeling system to provide multi-resolution models of a feature-based solid or non-manifold model on the basis of the effective feature zones. To facilitate the implementation, we introduce the class of the multi-resolution feature whose attributes contain all necessary information to build a multi-resolution solid model and extract LOD models from it. In addition, two methods are introduced to accelerate the extraction of LOD models from the multi-resolution modeling database: the one is using an NMT model, known as a merged set, to represent multi-resolution models, and the other is storing differences between adjacent LOD models to accelerate the transition to the other LOD. We also suggest the volume of the feature, regardless of feature type, as a criterion for the LOD. This criterion can be used in a wide range of applications, since there is no distinction between additive and subtractive features unlike the previous method.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

CyberClass Avatar System using Task-Level Behavior Description Language (작업 수준의 행위 표현 언어를 이용한 사이버강의용 아바타 시스템)

  • Kim, Jung-Hee;Lim, Soon-Bum
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.597-602
    • /
    • 2004
  • In spite of recent increase in the use of avatar systems in Web and Virtual Reality, there has not been a service that allows users to control directly the avatar behaviors. In addition, the conventional behavior control languages required a lot of complicated information for controlling the behaviors, so that users had difficulty using them. To apply written languages to a different task domain, moreover, it was necessary to modify or rewrite the languages. In this paper, for the avatar behavior control more simply define, “Task-Level Behavior Description Language,” which allows description the avatar behaviors in each task domain and “Motion Representation Language,” which enables writing detailed data for motion control. The system, developed in this paper, “included an Interpreter,” which automatically creates the Motion Representation Language, allowing users to easily control the avatar behaviors simply with the Behavior Description Language. The system was also applied to cyber classes, and the Task-level Behavior Description Language was compared with conventional languages to see how it was more effective in behavior description.

The Development of On-line Self-Test Module using Tracing Method (학습자 트레이싱을 통한 원격 교육용 자가 진단 모듈 개발)

  • Lee, Kyu-Su;Son, Cheol-Su;Park, Hong-Joon;Sim, Hyun;Oh, Jae-Chul
    • The KIPS Transactions:PartA
    • /
    • v.19A no.3
    • /
    • pp.147-154
    • /
    • 2012
  • The higher thinking skills, such as creativity and problem-solving about a given problem, are difficult to assess and diagnose. For an accurate diagnosis of these higher thinking abilities, we need to fully observe learner's problem-solving process or learner's individual reports. However, in an online learning or virtual class environments, evaluation of learner's problem-solving process becomes more difficult to diagnose. The best way to solve this problem is through reporting by tracking learner's actions when he tries to solve a problem. In this study, we developed a module which can evaluate and diagnose student's problem-solving ability by tracking actions in MS-Office suite, which is used by students to solve a given problem. This module performs based on the learner's job history through user tracking. To evaluate the effectiveness of this diagnostic module, we conducted satisfaction survey from students who were preparing the actual MOS exams. As a result, eighty-one (81) of the participants were positive on the effectiveness of the learning system with the use of this module.

High-rate BCI spelling System using eye-closed EEG signals (닫힌 눈(eye-closed) EEG신호를 이용한 높은 비율BCI 맞춤법 시스템)

  • Nguyen, Trung-Hau;Yang, Da-lin;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.2
    • /
    • pp.31-36
    • /
    • 2017
  • This study aims to develop an BCI speller utilizing eye-closed and double-blinking EEG based on asynchronous mechanism. The proposed system comprised a signal processing module and a graphical user interface (virtual keyboard-VK) with 26 English characters plus a special symbol. A detected "eye-closed" event induces the "select" command, whereas a "double-blinking" (DB) event functions the "undo" command. A three-class support vector machine (SVM) classifier involving EEG signal analysis of three groups of events ("eye-open"-idle state, "eye-closed", and "double -blinking") is proposed. The results showed that the proposed BCI could achieve an overall accuracy of 92.6% and a spelling rate of 5 letters/min on average. Overall, this study showed an improvement of accuracy and the spelling rate resulting from in the feasibility and reliability of implementing a real-world BCI speller.

  • PDF

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.