• Title/Summary/Keyword: Virtual address

Search Result 203, Processing Time 0.027 seconds

A Cluster-based QoS Multicast Routing Protocol for Scalable MANETs

  • Qabajeh, Mohammad M.;Adballa, Aisha H.;Khalifa, Othman O.;Qabajeh, Liana K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.741-762
    • /
    • 2011
  • Recently, multicast routing protocols become increasingly important aspect in Mobile Ad hoc Networks (MANETs), as they effectively manage group communications. Meanwhile, multimedia and real-time applications are becoming essential need for users of MANET. Thus it is necessary to design efficient and effective Quality of Service (QoS) multicast routing strategies. In this paper, we address the scalability problem of multicast routing protocols to support QoS over MANETs. In particular, we introduce a Position-Based QoS Multicast Routing Protocol (PBQMRP). Basically, the protocol based on dividing the network area into virtual hexagonal cells. Then, the location information is exploited to perform efficient and scalable route discovery. In comparison with other existing QoS multicast routing protocols, PBQMRP incurs less control packets by eliminating network flooding behavior. Through simulation, the efficiency and scalability of PBQMRP are evaluated and compared with the well-known On-Demand Multicast Routing Protocol (ODMRP). Simulation results justify that our protocol has better performance, less control overhead and higher scalability.

Mandibular Reconstruction Using the Free Vascularized Fibula Graft: An Overview of Different Modifications

  • Kokosis, George;Schmitz, Robin;Powers, David B.;Erdmann, Detlev
    • Archives of Plastic Surgery
    • /
    • v.43 no.1
    • /
    • pp.3-9
    • /
    • 2016
  • The reconstruction of the mandible is a complex procedure because various cosmetic as well as functional challenges must be addressed, including mastication and oral competence. Many surgical techniques have been described to address these challenges, including non-vascularized bone grafts, vascularized bone grafts, and approaches related to tissue engineering. This review summarizes different modifications of the free vascularized fibula graft, which, since its introduction by Hidalgo in 1989, has become the first option for mandibular reconstruction. The fibula free flap can undergo various modifications according to the individual requirements of a particular reconstruction. Osteocutaneous flaps can be harvested for reconstruction of composite defects. 'Double-barreling' of the fibula can, for instance, enable enhanced aesthetic and functional results, as well as immediate one-stage osseointegrated dental implantation. Recently described preoperative virtual surgery planning to facilitate neomandible remodeling could guarantee good results. To conclude, the free fibula bone graft can currently be regarded as the "gold standard" for mandibular reconstruction in case of composite (inside and outside) oral cavity defects as well as a way of enabling the performance of one-stage dental implantation.

A Study on the Internet-based Collaborative Exterior Design Process to Support Users′Participation in Apartment Exterior Remodeling (공동주택 외관 리모델링 과정에서 거주자 참여 설계를 지원하는 인터넷 기반 외관디자인 협업설계 프로세스에 관한 연구)

  • 심재란;최진원
    • Journal of the Korean housing association
    • /
    • v.14 no.4
    • /
    • pp.77-85
    • /
    • 2003
  • The facade design of apartment is getting more important, since residents'needs on raising the quality of housing have increased, and also public interests on urban landscape are higher than before. As a way of improving facade design the necessity of remodeling consequently has been risen. The government also relieves the regulations related to remodeling. A apartment facade design should address how to express both identities and aesthetic tastes of residents, so they want to reflect their own ideas and opinions on the apartment facade design during the remodeling process. It is not always easy, unfortunately, to reflect residents'ideas and opinions due to the public characteristics of apartment facades and absence of tools that support effective design participation. This paper proposes an internet-based collaborative design process that supports residents'active participation in the exterior remodeling process of apartment. We outline three main issues involved in developing the design system: 1) a semantic facade database built upon classification of building facades; 2) an Internet-based facade modeler based on a real-time, rule-based procedural modeling method; and finally 3) the virtual reality(VR) simulation that allows a group of designers and residents to design in a collaborative fashion.

Multi-homing in Heterogeneous Wireless Access Networks: A Stackelberg Game for Pricing

  • Lee, Joohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1973-1991
    • /
    • 2018
  • Multimedia applications over wireless networks have been evolving to augmented reality or virtual reality services. However, a rich data size compared to conventional multimedia services causes bandwidth bottlenecks over wireless networks, which is one of the main reasons why those applications are not used widely. To overcome this limitation, bandwidth aggregation techniques, which exploit a multi-path transmission, have been considered to maximize link utilization. Currently, most of the conventional researches have been focusing on the user end problems to improve the quality of service (QoS) through optimal load distribution. In this paper, we address the joint pricing and load distribution problem for multi-homing in heterogeneous wireless access networks (ANs), considering the interests of both the users and the service providers. Specifically, we consider profit from resource allocation and cost of power consumption expenditure for operation as an utility of each service provider. Here, users decide how much to request the resource and how to split the resource over heterogeneous wireless ANs to minimize their cost while supporting the required QoS. Then, service providers compete with each other by setting the price to maximize their utilities over user reactions. We study the behaviors of users and service providers by analyzing their hierarchical decision-making process as a multileader-, multifollower Stackelberg game. We show that both the user and service provider strategies are closed form solutions. Finally, we discuss how the proposed scheme is well converged to equilibrium points.

First-Principles Calculations for Design of Efficient Electrocatalysts (제일원리 계산을 활용한 전기화학 촉매 연구)

  • Kim, Dong Yeon
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.34 no.6
    • /
    • pp.393-400
    • /
    • 2021
  • As the recent climate problems are getting worse year after year, the demands for clean energy materials have highly increased in modern society. However, the candidate material classes for clean energy expand rapidly and the outcomes are too complex to be interpreted at laboratory scale (e.g., multicomponent materials). In order to overcome these issues, the first-principles calculations are becoming attractive in the field of material science. The calculations can be performed rapidly using virtual environments without physical limitations in a vast candidate pool, and theory can address the origin of activity through the calculations of electronic structure of materials, even if the structure of material is too complex. Therefore, in terms of the latest trends, we report academic progress related to the first-principles calculations for design of efficient electrocatalysts. The basic background for theory and specific research examples are reported together with the perspective on the design of novel materials using first-principles calculations.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Design and Development Study of a Trust-based Decentralized User Authentication System with Enhanced Data Preprocessing Functionality in a Metaverse Environment (메타버스 환경에서 Data Preprocessing 기능을 개선한 Trust-based Decentralized User Authentication 시스템 설계 및 개발 연구)

  • Suwan Park;Sangmin Lee;Kyoungjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.3-15
    • /
    • 2023
  • As remote services and remote work become commonplace, the use of the Metaverse has grown. This allows transactions like real estate and finance in virtual Second Life. However, conducting economic activities in the Metaverse presents unique security challenges compared to the physical world and conventional cyberspace. To address these, the paper proposes solutions centered on authentication and privacy. It suggests improving data preprocessing based on Metaverse data's uniqueness and introduces a new authentication service using NFTs while adhering to W3C's DID framework. The system is implemented using Hyperledger Indy blockchain, and its success is confirmed through implementation analysis.

Impact of personal characteristics on learning performance in virtual reality-based construction safety training - Using machine learning and SHAP - (가상현실 기반 건설안전교육에서 개인특성이 학습성과에 미치는 영향 - 머신러닝과 SHAP을 활용하여 -)

  • Choi, Dajeong;Koo, Choongwan
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.6
    • /
    • pp.3-11
    • /
    • 2023
  • To address the high accident rate in the construction industry, there is a growing interest in implementing virtual reality (VR)-based construction safety training. However, existing training approaches often failed to consider learners' individual characteristics, resulting in inadequate training for some individuals. This study aimed to investigate the impact of personal characteristics on learning performance in VR-based construction safety training using machine learning and SHAP (SHAPley Additional exPlanations). This study revealed that age exerted the greatest influence on learning performance, while work experience had the least impact. Furthermore, age exhibited a negative relationship with learning performance, indicating that the introduction of VR-based construction safety training can be effective for younger individuals. On the other hand, academic degree, qualifications, and work experience exhibited a positive relationship. To enhance learning performance for individuals with lower academic degree, it is necessary to provide content that is easier to understand. The lower qualifications and work experience have minimal impact on learning performance, so it is important to consider other learners' characteristics so as to provide appropriate educational content. This study confirmed that personal characteristics can significantly affect learning performance in VR-based construction safety training, highlighting the potential for leveraging these findings to provide effective safety training for construction workers.

Compliance to Feedback on Uncivil Comments in a Virtual Online News Portal: The Role of Avatar Presence (가상 온라인 기사 포털에서 아바타의 존재와 반시민적 댓글 피드백에 대한 행동 순응)

  • YounJung Park;HeeJo Keum;SeYoung Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.419-425
    • /
    • 2024
  • As digital communication gains prominence, there is an increasing trend in uncivil behaviors like rude or hateful comments and the empathetic actions towards them, highlighting the need for social efforts to address these issues. As part of these endeavors, we investigated how avatar feedback in a virtual news portal affects users' empathy towards uncivil comments. We defined both posting and empathizing with uncivil comments as antisocial actions. To this end, we posted socially controversial news in a virtual space and provided feedback in two forms when participants selected uncivil comments: text-only feedback and feedback accompanied by an avatar. We then assessed the impact of this feedback on behavioral conformity, guilt, and self-image concern through surveys. Our results showed that avatar-provided feedback significantly influenced participants' social responses more than text-based feedback. Interaction with avatars notably increased participants' behavioral conformity, guilt, and self-image concern. We concluded that avatar-based interactions can positively influence users' social behaviors and attitudes, suggesting their potential in fostering a more civil and responsible digital communication culture.