• Title/Summary/Keyword: Virtual address

Search Result 212, Processing Time 0.031 seconds

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

Image Processing Based Virtual Reality Input Method using Gesture (영상처리 기반의 제스처를 이용한 가상현실 입력기)

  • Hong, Dong-Gyun;Cheon, Mi-Hyeon;Lee, Donghwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.5
    • /
    • pp.129-137
    • /
    • 2019
  • Ubiquitous computing technology is emerging as information technology advances. In line with this, a number of studies are being carried out to increase device miniaturization and user convenience. Some of the proposed devices are user-friendly and uncomfortable with hand-held operation. To address these inconveniences, this paper proposed a virtual button that could be used in watching television. When watching a video on television, a camera is installed at the top of the TV, using the fact that the user watches the video from the front, so that the camera takes a picture of the top of the head. Extract the background and hand area separately from the filmed image, extract the outline to the extracted hand area, and detect the tip point of the finger. Detection of the end point of the finger produces a virtual button interface at the top of the image being filmed in front, and the button activates when the end point of the detected finger becomes a pointer and is located inside the button.

Performance Management Technique of Remote VR Service for Multiple Users in Container-Based Cloud Environments Sharing GPU (GPU를 공유하는 컨테이너 기반 클라우드 환경에서 다수의 사용자를 위한 원격 VR 서비스의 성능 관리 기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.9-22
    • /
    • 2022
  • Virtual Reality(VR) technology is an interface technology that is actively used in various audio-visual-based applications by showing users a virtual world composed of computer graphics. Since VR-based applications are graphic processing-based applications, expensive computing devices equipped with Graphics Processing Unit(GPU) are essential for graphic processing. This incurs a cost burden on VR application users for maintaining and managing computing devices, and as one of the solutions to this, a method of operating services in cloud environments is being used. This paper proposes a performance management technique to address the problem of performance interference between containers owing to GPU resource competition in container-based high-performance cloud environments in which multiple containers share a single GPU. The proposed technique reduces performance deviation due to performance interference, helping provide uniform performance-based remote VR services for users. In addition, this paper verifies the efficiency of the proposed technique through experiments.

Industry 4.0 & Construction H&S: Comparative Perceptions

  • Beale, James;Smallwood, John
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.249-256
    • /
    • 2020
  • Historical construction health and safety (H&S) challenges, in terms of a range of resources and issues, continue to be experienced, namely design process-related hazards are encountered on site, workers are unaware of the hazards and risks related to the construction process and its activities, activities are commenced on site without adequate hazard identification and risk assessments (HIRAs), difficulty is experienced in terms of real time monitoring of construction-related activities, workers handle heavy materials, plant, and equipment, and ultimately the experience of injuries. Given the abovementioned, and the advent of Industry 4.0, a quantitative study, which entailed the completion of a self-administered questionnaire online, was conducted among registered professional (Pr) and candidate Construction H&S Agents, to determine the potential of Industry 4.0 to contribute to resolving the challenges cited. The findings indicate that Industry 4.0 technologies such as augmented reality (AR), drone technology, virtual reality (VR), VR based H&S training, and wearable technology /sensors have the potential to resolve the cited H&S challenges as experienced in construction. Conclusions include that Industry 4.0 technologies can finally address the persistent H&S challenges experienced in construction. Recommendations include: employer associations, professional associations, and statutory councils should raise the level of awareness relative to the potential implementation of Industry 4.0 relative to H&S in construction; case studies should be documented and shared; tertiary construction management education programmes should integrate Industry 4.0 into all possible modules, especially H&S-related modules, and continuing professional development (CPD) H&S should address Industry 4.0.

  • PDF

A Process Management Framework for Design and Manufacturing Activities in a Distributed Environment (분산 환경하의 설계 및 제조활동을 위한 프로세스관리기법 연구)

  • Park, Hwa-Kyu;Kim, Hyun;Oh, Chi-Jae;Jung, Moon-Jung
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.21-37
    • /
    • 1997
  • As the complexity in design and manufacturing activities of distributed virtual enterprises rapidly increases, the issue of process management becomes more critical to shorten the time-to-market, reduce the manufacturing cost and improve the product quality. This paper proposes a unified framework to manage design and manufacturing processes in a distributed environment. We present a methodology which utilizes process flow graphs to depict the hierarchical structure of workflows and process grammars to represent various design processes and design tools. To implement the proposed concept, we develop a process management system which mainly consists of a cockpit and manager programs, and we finally address a preliminary implementation procedure based on the Object Modeling Technique. Since the proposed framework can be a formal approach to the process management by providing formalism, parallelism, reusability, and flexibility, it can be effectively applied to further application domains of distributed virtual enterprises.

  • PDF

An Exploratory Study Examining Users' Psychological Responses to Screen Speed in Virtual Reality Exergame (가상현실 운동게임의 화면 속도에 따른 사용자 반응)

  • Shin, Mincheol;Chung, Donghun
    • Journal of Korea Game Society
    • /
    • v.20 no.5
    • /
    • pp.41-52
    • /
    • 2020
  • This study aimed to address whether the varying degree of screen speed in the context of a Virtual reality exergame will interact with users' intrinsic motivation in influencing user perceptions. Results from our experiment (N = 40), showed that screen speed and intrinsic motivation have significantly interacted in influencing players' feeling of flow, attitude, and intention to replay the game (i.e., the 7km/h and 9km/h speeds have induced more favorable user perceptions than the 5km/h speed). Further implications of the findings are discussed.

Implementation of Policing Algorithm in ATM network (ATM 망에서의 감시 알고리즘 구현)

  • 이요섭;권재우;이상길;최명렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.181-189
    • /
    • 2001
  • In this thesis, a policing algorithm is proposed, which is one of the traffic management function in ATM networks. The proposed algorithm minimizes CLR(Cell Loss patio) of high priority cells and solves burstiness problem of the traffic caused by multiplexing and demultiplexing process. The proposed algorithm has been implemented with VHDL and is divided into three parts, which are an input module, an UPC module, and an output module. In implementation of the UPC module\`s memory access, memory address is assigned according to VCI\`s LSB(Lowest Significant Byte) of ATM header for convenience. And the error of VSA operation from counter\`s wrap-around can be recovered by the proposed method. ANAM library 0.25 $\mu\textrm{m}$ and design compiler of Synopsys are used for synthesis of the algorithm and Synopsys VSS tool is used for VHDL simulation of it

  • PDF

Multimedia Scaffolding Tools to Help Children's Scientific Investigation in a Virtual Field (가상 필드에서 초등학생들의 과학적 탐구를 도와주는 멀티미디어 보조 도구)

  • Choo Yongjoo;Park Kyoung Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.143-150
    • /
    • 2005
  • The Field is a simulated virtual environment specifically designed to assist elementary students learn the basic scientific inquiry skills such as observation, data collection, and generating and verifying hypothesis. Over the last four years, the Field has been used to teach inquiry learning in the context of mathematics and science in an elementary school. During the studies, it was observed that students suffered from problems in navigation, wayfinding, and data collection. First, this papers discusses the problems and the technical aids we have iteratively developed to address these issues. We will then discuss the impact of the technical aids on the student's behaviors.

Memory Access for High-Performance Hologram Generation Hardware (고속 홀로그램 생성 하드웨어를 위한 메모리 접근)

  • Lee, Yoon-Hyuk;Park, Sung-Ho;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.335-344
    • /
    • 2014
  • In this paper we analysis for in out signal by previous study and implement virtual master that generate CGH processor signals. Also, we propose memory address mapping. By constructing the system model of our method and by analyzing the latencies according to the memory access methods in a system including our model and several other models, the low-latency memory access method has been obtained. The proposed method is reduce number of activation in DRAM.

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF