• Title/Summary/Keyword: Virtual ID

Search Result 50, Processing Time 0.032 seconds

An Advanced QER Selection Algorithm Based on MMT Protocol for 360-Degree VR Video Streaming (MMT 프로토콜 기반의 360도 VR 비디오 전송을 위한 개선된 QER 선택 알고리듬)

  • Kim, A-young;An, Eun-bin;Seo, Kwang-deok
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.948-955
    • /
    • 2019
  • As interests in 360-degree VR (Virtual Reality) video services enormously grow, compression and streaming technologies for VR video data have been rapidly developed. Quality Emphasized Region (QER) based streaming scheme has been developed as a kind of viewport-adaptive 360-degree video streaming technology for maintaining immersive experience and reducing bandwidth waste. For selecting a QER corresponding to the user's gaze coordinate, QER-based streaming scheme requires the calculation of Quality Emphasis Center (QEC) distance and signaling message delivery for requesting QER switching. QEC distance calculations require high computational complexity because of repeated calculations as many times as the number of QERs. Furthermore, the signaling message interval results in a trade-off relationship between efficient bandwidth usage and flexible QER switching. In this paper, we propose an improved QER selection algorithm based on MMT protocol to solve this problem. The proposed algorithm could achieve computational complexity reduction by using preprocessed QER_ID_MAP. Also, flexible QER switching could be achieved, as well as efficient bandwidth utilization by an adaptive adjustment of the signaling interval.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

R3: A Lightweight Reactive Ring based Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Yu, Sheng;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5442-5463
    • /
    • 2016
  • Designing efficient routing protocols for a wireless sensor network with mobile sinks (mWSN) is a challenging task since the network topology and data paths change frequently as sink nodes move. In this paper, we design a novel lightweight reactive ring based routing protocol called R3, which removes the need of proactively maintaining data paths to mobile sinks as they move in the network. To achieve high packet delivery ratio and low transmission cost, R3 combines ring based forwarding and trail based forwarding together. To support efficient ring based forwarding, we build a ring based structure for a network in a way such that each node in the network can easily obtain its ring ID and virtual angle information. For this purpose, we artificially create a virtual hole in the central area of the network and accordingly find a shortest cycled path enclosing the hole, which serves as base ring and is used for generating the remaining ring based structure. We accordingly present the detailed design description for R3, which only requires each node to keep very limited routing information. We derive the communication overhead by ring based forwarding. Extensive simulation results show that R3 can achieve high routing performance as compared with existing work.

Fast Generation of Stereoscopic Virtual Environment Display Using P-buffer

  • Heo, Jun-Hyeok;Jung, Soon-Ki;Wohn, Kwang-Yun
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.202-210
    • /
    • 1998
  • This paper is concerned with an efficient generation of stereoscopic views for complex virtual environments by exploiting frame coherence in visibility. The basic idea is to keep visible polygons throughout the rendering process. P-buffer, a buffer of image size, holds the id of the visible polygon for each pixel. This contrasts to the frame buffer and the Z-buffer which hold the color information and the depth information, respectively. For the generation of a consecutive image, the position and the orientation of the visible polygons in the current view are updated according to the viewer's movements, and re-rendered on the current image under the assumption that, when the viewer moves slightly, the visibility of polygons remains unchanged. In the case of stereoscopic views, it may not introduce much difficulty when we render the right(left) image using visible polygons on the (right) image only, The less difference in two images is, the easier the matching becomes in perceiving depth. Some psychophysical experiments have been conducted to support this claim. The computational complexity for generating a fight(left) image from the previous left(right) image is bounded by the size of image space, and accordingly. It is somewhat independent of the complexity of the 3-D scene.

  • PDF

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

Virtual Screening Approaches in Identification of Bioactive Compounds Akin to Delphinidin as Potential HER2 Inhibitors for the Treatment of Breast Cancer

  • Patidar, Kavisha;Deshmukh, Aruna;Bandaru, Srinivas;Lakkaraju, Chandana;Girdhar, Amandeep;Gutlapalli, VR;Banerjee, Tushar;Nayarisseri, Anuraj;Singh, Sanjeev Kumar
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.4
    • /
    • pp.2291-2295
    • /
    • 2016
  • Small molecule tyrosine kinase inhibitors targeting HER 2 receptors have emerged as an important therapeutic approach in inhibition of downstream proliferation and survival signals for the treatment of breast cancers. Recent drug discovery efforts have demonstrated that naturally occurring polyphenolic compounds like delphinidin have potential to inhibit proliferation and promote apoptosis of breast cancer cells by targeting HER2 receptors. While delphinidin may thus reduce tumour size, it is associated with serious side effects like dysphonia. Owing to the narrow therapeutic window of delphinidin, the present study aimed to identify high affinity compounds targeting HER2 with safer pharmacological profiles than delphinidin through virtual screening approaches. Delphinidin served as the query parent for identification of structurally similar compounds by Tanimoto-based similarity searching with a threshold of 95% against the PubChem database. The compounds retrieved were further subjected to Lipinski and Verber's filters to obtain drug like agents, then further filtered by diversity based screens with a cut off of 0.6. The compound with Pubchem ID: 91596862 was identified to have higher affinity than its parent. In addition it also proved to be non-toxic with a better ADMET profile and higher kinase activity. The compound identified in the study can be put to further in vitro drug testing to complement the present study.

Efficient Query Indexing for Short Interval Query (짧은 구간을 갖는 범위 질의의 효율적인 질의 색인 기법)

  • Kim, Jae-In;Song, Myung-Jin;Han, Dae-Young;Kim, Dae-In;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.507-516
    • /
    • 2009
  • In stream data processing system, generally the interval queries are in advance registered in the system. When a data is input to the system continuously, for realtime processing, a query indexing method is used to quickly search queries. Thus, a main memory-based query index with a small storage cost and a fast search time is needed for searching queries. In this paper, we propose a LVC-based(Limited Virtual Construct-based) query index method using a hashing to meet the both needs. In LVC-based query index, we divide the range of a stream into limited virtual construct, or LVC. We map each interval query to its corresponding LVC and the query ID is stored on each LVC. We have compared with the CEI-based query indexing method through the simulation experiment. When the range of values of input stream is broad and there are many short interval queries, the LVC-based indexing method have shown the performance enhancement for the storage cost and search time.

Postal Image Filtering Method based on ROI Image Matching (수취인 주소 영역의 영상매칭에 기반 한 유사 우편물 추출 방법)

  • 정창부;박상철;손화정;김수형
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.793-795
    • /
    • 2004
  • 우편물을 배달순서대로 정렬하는 과정을 순로구분이라고 하는데, 우편물의 처리과정에서 가장 많은 시간이 소요되는 부분이 바로 이 순로구분 과정이다. 우정선진국의 순로구분 자동화 시스템은 바코드를 이용하여 순로구분를 자동으로 처리하고 있지만, 국내의 시스템은 순로구분의 전 단계까지만 수행하고 나머지 과정은 배달원이 자신의 경험에 의해 수작업으로 처리하고 있다. 본 논문에서는 우편물을 자동 검증하는 방법으로 바코드 대신에 우편영상 특징기반의 Virtual ID 사용을 위한 유사한 우편영상 추출방법을 제안한다. 제안 방법은 질의영상과 후보영상간의 유사성을 판별할 때, 각 영상의 수취인 영역에서 추출된 문자열 Bounding Box들의 대응되는 쌍을 결정하고 그 쌍들의 영역이 겹치는 정도를 유사도로 측정하는 방법이다 291개의 우편영상에 대하여 실험한 결과, 289개의 영상이 정상적으로 유사한 우편영상으로 추출되었다. 또한, 유사한 우편영상으로 추출된 영상의 평균개수는 3.78개로 비교적 높게 나왔지만 이는 실험 데이터에 동일 DM 발송 우편물이 연속적으로 위치한 경우가 많았기 때문이다.

  • PDF

QoS for Mobile MPLS VPN (이동성을 갖는 MPLS VPN에서의 QoS)

  • 송영필;양해권
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.159-163
    • /
    • 2003
  • The term "VPN", or Virtual Private Network, generally means the public network of vendors which is providing a communication net and other network using WWW as a backbone of Its WAN. the existing VPN is expected to reduce expenses and will improve the productivity, however, the network provider should accept the management complexity and the overhead after tunneling and encryption. But MPLS VPN can provide efficient VPN which would not need the address transformation and the additional overhead made by tunneling after giving separately ID. This paper describes the protocol for MPLS VPN which is about a node that moves based on Customer Edge (CE) router and supports a scheme for QoS.

  • PDF

AUTOMATIC TEXTURE EXTRACTION FROM AERIAL PHOTOGRAPHS USING THE ZI-BUFFER

  • Han, Dong-Yeob;Kim, Yong-Il;Yu, Ki-Yun;Lee, Hyo-Seong;Park, Byoung-Uk
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.584-586
    • /
    • 2007
  • 3D virtual modeling such as creation of a cyber city or landscape, or making a 3D GIS requires realistic textures. Automatic texture extraction using close range images is not yet efficient or easy in terms of data acquisition and processing. In this paper, common problems associated with automatic texture extraction from aerial photographs are explored. The ZI-buffer, which has depth and facet ID fields, is proposed to remove hidden pixels. The ZI-buffer algorithm reduces memory burden and identifies visible facets. The correct spatial resolution for facet gridding is tested. Error pixels in the visibility map were removed by filtering.

  • PDF