• Title/Summary/Keyword: massive virtual users

Search Result 11, Processing Time 0.193 seconds

A Study on the Effects of a Virtual-Users Model Computing the Semantics of Spaces for the Operation and Understanding of Human Behavior Simulation of Architecture-Major Students (공간의 의미를 연산하는 가상 사용자 모델이 건축설계 전공학생들의 인간행동 시뮬레이션 운용과 이해도에 미치는 효과에 관한 연구)

  • Hong, Seung-Wan
    • Journal of KIBIM
    • /
    • v.6 no.3
    • /
    • pp.34-41
    • /
    • 2016
  • The previous studies argue that using the semantic properties of BIM objects is efficient for simulating the behaviors of autonomous, computer agents, called virtual-users, but such assumption is not proven via evidence-based research approaches. Hence, this present study aims to investigate the empirical effects of a human behavior simulation model equipped the semantics of spaces on the architecture-major students' operation and understanding of the simulation system, compared to a typical path-finding model. To achieve the aim, this study analyzed the survey and interview data, collected in the authentic design projects. The analysis indicates that (1) using a simulation model equipped the semantics of spaces helps the students' operation of the simulation, and (2) it also aids understanding the relationship between the variables of spaces and virtual-users (${\alpha}=0.74$). In addition, the qualitative data inform that the advantages of the simulation model that computes the semantics of spaces stem in the automatic behavioral changes of massive numbers of virtual-users, and efficient detection and activation on the what-if situations. The analysis also reveals that the simulation model has shortcomings in orchestrating the complex data structure between the semantics properties of spaces and virtual-users under multi-sequential scenarios. The results of this study contribute to develop a future design system combining BIM with human behavior simulation.

Design and Implementation of Virtual Grid and Filtering Technique for LBSNS (LBSNS를 위한 Virtual Grid 및 필터링기법의 설계 및 구현)

  • Lee, Eun-Sik;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.91-94
    • /
    • 2011
  • The LBSNS(Location-Based Social Networking Service) service has been well-received by researchers and end-users, such as Twitter. Location-Based service of Twitter is now structured that users could not subscribe the information of their interesting local area. Those who being following from someone tweet message included information of local area to them just for their own interesting. However, follower may receive that kind of tweet. In order to handle the problem, we propose filtering technique using spatial join. The first work for filtering technique is to add a location information to tweets and users. In this paper, location information is represented by MBR(Minimum Bounding Rectangle). Location information is divided into dynamic property and static property. Suppose that users are continuously moving, that means one of the dynamic property's example. At this time, a massive continous query could cause the problem in server. In this paper, we create Virtual Grid on Google Map for reducing frequency of query, and conclude that it is useful for server.

  • PDF

Building a virtual art exhibition including various shapes and characteristics of contemporary art in Second Life (가상현실에서의 컨템포러리아트 전시 구축 방법론 연구 -세컨드라이프 내 가상미술 전시 구축 사례를 중심으로-)

  • Park, Ju-Hee;Kim, Jung-Wha
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1246-1251
    • /
    • 2009
  • Second Life is a massive multi-user on-line environment; "a 3D virtual world where users can socialize, connect and create using voice and text chat" (http://www.secondlife.com). The paper explores the process and methods to establish a contemporary art exhibition that incudes various shapes and characteristics of art; paintings, 3D sculptures, time-based video arts, technical based arts, and so on. We have also discuss about the technical limitations to make virtual museums in the Second Life and recognitions between human and art works.

  • PDF

Blackbox and Scenario-Based Testing of Online Games Using Game Description Language

  • Cho, Chang-Sik;Lee, Dong-Chun;Sohn, Kang-Min;Park, Chang-Joon;Kang, Ji-Hoon
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.470-473
    • /
    • 2011
  • In this letter, we propose blackbox and scenario-based testing of multiplayer online games as well as simple load testing. Game testing is done from outside the source code, and the access to the source code is not required to testers because the game logic is described with a game description language and virtual game map. Instead of using a subset of the main game client for the test client, only game packet protocols and the sequence of packets are analyzed for new game testing. In addition, complex and various scenarios can be tested through combining defined actions. Scenario-based testing helps testers mimic real testing environments instead of doing simple load testing and improves the productivity of game testing.

Multi-Layer Sharing Model for Efficient Collaboration in Distributed Virtual Environments (가상환경에서 효율적인 협업을 위한 다중계층 공유모델)

  • 유석종
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.388-398
    • /
    • 2004
  • This paper focuses on the reduction method of message traffic occurred when multiple participants collaborate in the distributed virtual environment. It is referred to as filtering method of update message to minimize data traffic exchanged in the virtual environment, and it is the essential process to improve the scalability of the virtual environment. Spatial partitioning method, a popular filtering technique, divides the whole environment into smaller sub-parts in order to make it small the regions to be maintained consistently. However, it is less flexible and adaptable because the information of area of interest must be configured before simulation. In this paper, the concept of dynamic area of interest is proposed, which is highly adaptable by applying dynamic environmental elements to AOI management. It uses multiple layering and multiple consistency algorithms for dynamic management, and makes it possible to consume system resource efficiently. For performance evaluation, experiments are performed with virtual avatars, measuring message traffic. Finally, the proposed model could be applied to the AOI management systems which accommodate massive users like MMORPG, or virtual communities.

  • PDF

A Study of a Game User Oriented Load Balancing Scheme on MMORPG (MMORPG 서버를 위한 게임 사용자 중심의 부하 분산 기법에 관한 연구)

  • Choi, Jong-Gwan;Kim, Hye-Young;Woo, Won-Sik
    • Journal of Korea Game Society
    • /
    • v.12 no.3
    • /
    • pp.69-76
    • /
    • 2012
  • At MMORPGs that has the numerous game users with many interactions at the same virtual world, massive loading that results in delays, resource shortages, and other such problems occur. To solve this, many developers devote research to load-balancing servers, yet due to steady and dynamic map divisions, such research is unreliable. This paper proposes a game user-oriented load balancing scheme for the load balancing of MMORPG servers. This scheme shows effectiveness at dealing with hot-spots and other gatherings of game users at specific servers compared to previous methods.

Real-time wireless Audio/video Transmission Technique for Handheld Devices (휴대용 단말기를 위한 실시간 무선 영상 음성 전송 기술)

  • Yoon, Kyung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.111-117
    • /
    • 2009
  • Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment

  • Supreeth, S.;Patil, Kirankumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1892-1912
    • /
    • 2022
  • With the massive demand and growth of cloud computing, virtualization plays an important role in providing services to end-users efficiently. However, with the increase in services over Cloud Computing, it is becoming more challenging to manage and run multiple Virtual Machines (VMs) in Cloud Computing because of excessive power consumption. It is thus important to overcome these challenges by adopting an efficient technique to manage and monitor the status of VMs in a cloud environment. Reduction of power/energy consumption can be done by managing VMs more effectively in the datacenters of the cloud environment by switching between the active and inactive states of a VM. As a result, energy consumption reduces carbon emissions, leading to green cloud computing. The proposed Efficient Dynamic VM Scheduling approach minimizes Service Level Agreement (SLA) violations and manages VM migration by lowering the energy consumption effectively along with the balanced load. In the proposed work, VM Scheduling for Efficient Dynamically Migrated VM (VMS-EDMVM) approach first detects the over-utilized host using the Modified Weighted Linear Regression (MWLR) algorithm and along with the dynamic utilization model for an underutilized host. Maximum Power Reduction and Reduced Time (MPRRT) approach has been developed for the VM selection followed by a two-phase Best-Fit CPU, BW (BFCB) VM Scheduling mechanism which is simulated in CloudSim based on the adaptive utilization threshold base. The proposed work achieved a Power consumption of 108.45 kWh, and the total SLA violation was 0.1%. The VM migration count was reduced to 2,202 times, revealing better performance as compared to other methods mentioned in this paper.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.