• Title/Summary/Keyword: real-time networking

Search Result 246, Processing Time 0.03 seconds

Augmented Reality Board Game Framework (증강현실 보드게임 프레임워크)

  • Kim, jin-guk;Lee, jong-weon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.639-643
    • /
    • 2007
  • The paper presents a framework for developing real-time multi-user board games and applications in augmented reality. Recently, increase the environment to playing game in augmented reality with advancement of computing ability improvement and wireless networking technique of mobile device. While the trend of utilizing this kind of games is creasing, the facts that there is a shortage of games whose contents are attractive to users. In this paper we propose a framework that enables game content developers to develop new game contents base on augmented reality easily and quickly. This framework is an automatic service that can augment in various methods by using the supported marker recognition service. Therefore game contents developers do not need to know about either augmented reality technique or the inner process structure. The framework also supports special functions and various interaction interfaces for augmented reality board game and components of the board game we can implement. These enable developers to accomplish all the necessary components and structures of the board game more easily.

  • PDF

Performance Enhancement of AAA-based Authentication forHMIPv6 (AAA 기반의 인증을 이용한 HMIPv6 성능 개선 기법)

  • Kim, Mi-Young;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.551-560
    • /
    • 2005
  • To reduce the amount of the signaling messages occurred in movement, HMIPv6 has been introduced as the hierarchical mobility management architecture tor MIPv6 by regarding the locality of movements. When approaching the visited link, the authentication procedure should be done successfully prior to any motility support message exchanges. The AAA(Authentication, Authorization and Account) authentication service is applied gradually to the wireless LAN and Cellular networks. However, It may bring about the service latency for the sessions of requiring the real-time processing due to not providing the optimized signaling in local and frequent movements. In this paper, we propose the authentication architecture with 'delegation' scheme to reduce the amount of signaling message and latency to resume for local movements by integrating it with HMIPv6 architecture. We provide the integrated authentication model and analyze the performance and effectivity of our proposal and finally offer the analysis materials comparing to the exiting authentication scheme. It cuts down the cost to $33.6\%$ at average measurement.

Performance Analysis of HMIPv6 applying Adaptive MAP Domain Size (적응적 MAP도메인 크기를 적용한 HMIPv6의 성능분석)

  • ;Choe Jongwon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.625-632
    • /
    • 2005
  • Recently, real time services have been demanding a lot and the number of mobile devices is increasing extremely. Many researchers are focusing on decreasing handoff or signaling cost, produced when mobile devices are moving around. With these efforts, HMIPv6(Hierarchical Mobile Internet Protocol Version 6) was proposed. Mobile nodes do not need to register their locations to Home Agents whenever crossing over subnets within a MAP domain. In HMIPv6, mobile nodes choose the farthest MAP without considering node mobility pattern. However, a large MAP domain is not always efficient for a slow moving node and required additional work to choose a MAP in HMIPv6. Hence, this paper proposes 'Performance Analysis of HMIPv6 applying adaptive MAP Domain Site'.

Distributed Virtual Topology Adaptation Method to Support IP Traffic in WDM Mesh Networks (WDM Mesh 네트워크에서 IP 트래픽을 수용하기 위한 분산형 가상토폴로지 적응 기법)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lee, Yong-Won;Chang, Sun-Hyok;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.1-10
    • /
    • 2007
  • We propose a new approach to accommodate bidirectional asymmetric traffic demands as well as unexpected dynamic internet traffic variation in the WDM mesh network by using optical networking technologies. In the proposed scheme, an intermediate node determines the optical path based on the switching statistics of IP router of the node which characterizes the Internet traffic variation, which in effect provides a dynamic and distributed traffic control over the network. It is expected to reduce the efficiency deterioration of RWA(Routing and Wavelength Assignment) due to the real-time variation of Internet traffic so that expandability and flexibility of the network can be enhanced. In this paper, we describe a methodology for traffic behavior analysis at a node, and the decision policy of the establishment/release of optical path. In addition, we evaluate the performance of the proposed scheme through the computer simulations.

A study on the Stress of Using Social Networking Services and Its Discontinuance Intention (소셜네트워크서비스(Social Network Service) 사용의 스트레스와 사용중단의도에 관한 연구)

  • Park, Kyung-Ja;Park, Seung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.275-285
    • /
    • 2014
  • The development of ICT has promoted the infusion of 'social,' which is not only 'personal,' but also strengthens social connection and communication; and SNS lies in the center of the infusion. Although SNS has been positioning itself as a significant domain in our lives based on the developed technologies, such as openness, extendibility and real-time, it has caused social concerns due to unexpected side effects. Therefore, this study aims to identify the stressors causing SNS stress and the factors influencing discontinuance of SNS. As a result, 5 factors including 'techno-overload,' 'techno-invasion,' 'techno-insecurity,' 'techno-complexity' and 'pace of change' were found to be SNS stressors. It is thought that this study would provide an academic implication for the future studies of stress and discontinuance related to SNS and a guideline for establishing practical strategies.

A Study on Ships of KRS Registered the analyses of Detentions for Port State Control (한국선급 입급선 항만국통제의 출항정지 분석에 관한 연구)

  • IM, Myeong-Hwan;LEE, Chang-Hyun;SIN, Ho-Sig
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.1
    • /
    • pp.34-46
    • /
    • 2016
  • This study analyzes inspection results of ships by Port State Control. Particularly, this research focuses on a detention trend of vessels that registered to Korean Register of Shipping. In order to conduct this research, we have searched 170 ships that got a detention with a Code-30 within recent 46 months period. The deficiencies of the detentions are inspected by ship types, ship years, flags, ports inspected, and criteria. Moreover, we categorized the deficiencies for the detentions into 17 types for internal and external inspections. As the results of the comparison study, bulk and general cargo carriers dominate the portion of detentions by almost 66 percent. Self-induced detention due to a lack of preparation by crews and company support are the main reasons of repeated detentions from the same type ships. Ships between six and ten years old show the lowest detention rate by 4 percent whereas ships less than five years old generate the highest detention rate by 22 percent. The main categories of the detentions from ships less than 5 years old are a lack of documentation and certification, and the clues support our opinion that owners and crews may neglect to prepare the inspections because their strong confidence for the ship condition due to young ship age. As a result of a great effort of Korean government and shipping companies to reduce a detention rate, the detention rate has been recently reduced to 0.3 percent. The results also require companies with the flag of convenience ships to spend more effort to reduce the detention rate, too. We expect that using social networking service by Korea Register will lower the detention rate by sharing relevant information real-time to ships and owners.

The Grey Box of Technoscientific Practices: Laboratory as a Heterotopic Space where In/visible Collaborations Take Place (과학적 실행의 회색상자(grey box): 비/가시적 협력의 헤테로토피아(heterotopia)로서의 실험실 공간)

  • Lee, June Seok
    • Journal of Science and Technology Studies
    • /
    • v.13 no.1
    • /
    • pp.1-39
    • /
    • 2013
  • How would technoscientists collaborate in their technoscientific practices? Based on the ethnographic research done at NRI(Neuroscience Research Institute), this research shows how collaboration occurs in/outside the interdisciplinary laboratory. As previous studies show, collaboration makes researches possible that otherwise would have been impossible. Korean technoscientists who are situated in the scientific periphery, practice contextualized collaboration in their labs. These collaborations are invisible before opening the black box of the lab. But it acquires visibility after certain incidents such as collaborations, debates and discussions, malfunctioning of the instruments, and networking with other actors occur. These networks again become invisible after the certain incidents end. However these blackboxing and whiteboxing (opening the blackbox) processes occur simultaneously in various levels, it is almost impossible to identify them separately. In real technoscientific practices, blackboxing and whiteboxing do not occur distinctively. They almost always occur at the same time on multi-layered levels, hence forming the 'grey box' of technoscientific practices. Lastly, collaborations inside laboratory have in/visible features, because laboratories function as Foucauldian heterotopias.

  • PDF

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

A Reliable Route Selection Algorithm in Mobile Ad-hoc Networks (이동 애드혹 네트워크에서의 안정 경로 선택 알고리즘)

  • Kim, Won-Ik;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.314-323
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been Proposed. However, when theme protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoc networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable route that is impervious to route failures by topological changes by mobile hoots. For reliable route selection, the concept of virtual zone (stable zone and caution zone) is proposed. The zone is located in a mobile node'transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Route-optimized Handoff in Mobile CORBA Environment (Mobile CORBA 환경에서 게이트웨이간의 경로최적화 핸드오프)

  • Shin, Hye-Ryung;Lee, Hyung-Woo;Kim, Ju-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.224-232
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been proposed. However, when these protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoe networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable rouse that is impervious to route failures by topological changes by mobile hosts. For reliable route selection, the concept of virtual zone (stable lone and caution zone) is proposed. The lone is located in a mobile node's transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.