• Title/Summary/Keyword: virtual destination

Search Result 62, Processing Time 0.028 seconds

End-to-End Congestion Control of High-Speed Gigabit-Ethernet Networks based on Smith's Principle

  • Lee, Seung-Hyub;Cho, Kwang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.101-104
    • /
    • 2000
  • Nowadays, the issue of congestion control in high-speed communication networks becomes critical in view of the bandwidth-delay products for efficient data flow. In particular, the fact that the congestion is often accompanied by the data flow from the high-speed link to low-speed link is important with respect to the stability of closed-loop congestion control. The Virtual-Connection Network (VCN) in Gigabit Ethernet networks is a packet-switching based network capable of implementing cell- based connection, link-by-link flow-controlled connection, and single- or multi-destination virtual connections. VCN described herein differ from the virtual channel in ATM literature in that VCN have link-by-link flow control and can be of multi-destination. VCNs support both connection-oriented and connectionless data link layer traffic. Therefore, the worst collision scenario in Ethernet CSMA/CD with virtual collision brings about end-to-end delay. Gigabit Ethernet networks based on CSMA/CD results in non-deterministic behavior because its media access rules are based on random probability. Hence, it is difficult to obtain any sound mathematical formulation for congestion control without employing random processes or fluid-flow models. In this paper, an analytical method for the design of a congestion control scheme is proposed based on Smith's principle to overcome instability accompanied with the increase of end-to-end delays as well as to avoid cell losses. To this end, mathematical analysis is provided such that the proposed control scheme guarantees the performance improvement with respect to bandwidth and latency for selected network links with different propagation delays. In addition, guaranteed bandwidth is to be implemented by allowing individual stations to burst several frames at a time without intervening round-trip idle time.

  • PDF

Constructivist Research in Smart Tourism

  • Hunter, William Cannon;Chung, Namho;Gretzel, Ulrike;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.103-118
    • /
    • 2015
  • Smart tourism is a social phenomenon arising from the convergence of information technology with the tourism experience. New ways of doing business, new patterns of experience and new problems concerning tourism destination image management and marketing are emerging due to the ubiquitous presence and influence of the internet and mobile devices. New conceptual tools are also available to enable researchers to further understand the social implications as well as the practical implementation of these new virtual and augmented smart tourism ecosystems. To this effect this paper introduces the constructivist paradigm and associated research methodologies as another toolbox for interpreting how smart tourism works as a form of soft power. The implications revealed by constructivism are that through smart tourism ecosystems, destination commodification and commoditization, experience and image formation are increasingly self-perpetuating, autonomous and organic social constructions. Researchers in information technology can use constructivist research to further explore these dynamic developments in smart tourism.

Video Segmentation and Video Segment Structure for Virtual Navigation

  • Choi, Ji-Hoon;Kim, Seong-Baek;Lee, Seung-Yong;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.783-785
    • /
    • 2003
  • In recent years, the use of video in GIS is considered to be an important subject and many related studies result in VideoGIS. The virtual navigation is an important function that can be applied to various VideoGIS applications. For virtual navigation by video, the following problems must be solved. 1) Because the video route may be not exactly coincided with route that user wants to navigate, parts of several video clips may be required for single navigation. Virtual navigation should allow the user to move from one video to another at the proper position. We suggest the video segmentation method based on geographic data combined with video. 2) From a point to a destination, the change frequency of video must be minimized. The frequent change of video make user to mislead navigation route and cause the wasteful use of computing resource. We suggest methods that structure video segments and calculate weight value of each node and link.

  • PDF

A Data Ferrying-Based Virtual Full-Duplex Relaying Scheme with Two UAVs (두 UAV를 활용하는 데이터 페리 기반의 가상 전이중 중계전송 기법)

  • Woo, Dong Hyuck;Hwang, Ho Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1639-1645
    • /
    • 2020
  • In this paper, we propose a virtual full-duplex relaying scheme based on data ferrying using two unmanned aerial vehicles (UAVs). By utilizing high mobility of two UAVs, the proposed relaying scheme can make each UAV communicate with a source node or a destination node when the UAV is near the source node or the destination node. The proposed relaying scheme can overcome the performance limitations of the half-duplex relaying and the implementation constraints of the full-duplex relaying. In addition, we propose an algorithm to shift the center point of two UAVs' trajectory with consideration of inter-relay interference (IRI). We show the simulation results of our proposed trajectory's center point shift algorithm. From the simulation results, it is shown that our proposed relaying scheme can achieve higher end-to-end spectral efficiency (SE) than the conventional static relaying scheme.

Effect of Relay Location in Cooperative Networks with Partially Differential Modulation Scheme (부분차등변조 방식을 이용한 협력네트워크에서의 중계기 위치의 영향)

  • Cho, Woong;Cho, Han-Byeog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.671-676
    • /
    • 2015
  • Cooperative networks eliminate shadow area using relay and enhance communication performance by creating virtual multi input multi output (MIMO) system. In this paper, we analyze the performance of cooperative networks which use coherent modulation scheme in source-relay nodes and differential modulation scheme in relay-destination nodes depending on the relay location. We consider the performance analysis of systems with and without the direct transmission between source and destination node where the direct transmission adopts differential modulation scheme. In addition, the performance of the system with fully differential modulation scheme is compared with the system using partially differential modulation scheme. The performance of system is based on the symbol error rate between source and destination node.

An optimal and genetic route search algorithm for intelligent route guidance system (지능형 주행 안내 시스템을 위한 유전 알고리즘에 근거한 최적 경로 탐색 알고리즘)

  • Choe, Gyoo-Seok;Woo, Kwang-Bang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.2
    • /
    • pp.156-161
    • /
    • 1997
  • In this thesis, based on Genetic Algorithm, a new route search algorithm is presented to search an optimal route between the origin and the destination in intelligent route guidance systems in order to minimize the route traveling time. The proposed algorithm is effectively employed to complex road networks which have diverse turn constrains, time-delay constraints due to cross signals, and stochastic traffic volume. The algorithm is also shown to significantly promote search efficiency by changing the population size of path individuals that exist in each generation through the concept of age and lifetime to each path individual. A virtual road-traffic network with various turn constraints and traffic volume is simulated, where the suggested algorithm promptly produces not only an optimal route to minimize the route cost but also the estimated travel time for any pair of the origin and the destination, while effectively avoiding turn constraints and traffic jam.

  • PDF

Escaping Route Method in a Trap Situation for Local Path Planning (로컬 경로 계획을 위한 포텐셜 함수 기반의 가상 탈출 루트 연구)

  • Kim, Dong-Hun;Lee, Hyun-Woo
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.1989-1990
    • /
    • 2006
  • This paper presents an escaping route method in a trap situation (a case that the robot is trapped in a local minimum by the potential of obstacles). In this scheme, the APFs for path planning have a multiplicative and auditive configuration between APFs for goal destination and APFs for obstacle avoidance unlike conventional configuration where APFs for obstacle avoidance is added to APFs for goal destination. The virtual escaping route method is proposed to allow a robot to escape from a local minimum in trap situation where the total forces composed of repulsive forces by obstacles and attractive force by a goal are zero.

  • PDF

Development of 3D Car Navigation System Using Image-based Virtual Environment (실사기반 가상환경기술을 이용한 차량용 3차원 네비게이션 시스템 개발)

  • Kim Chang-Hyun;Lee Wan-Bok
    • Journal of Game and Entertainment
    • /
    • v.2 no.1
    • /
    • pp.35-44
    • /
    • 2006
  • Objective of this study is to develop a 3D car navigation system that shows the driving direction to a destination through real-time 3-D panoramic views of the route. For the purpose, a new searching process was established to find the optimal driving direction based on the driver's current location and the real-time traffic situation and the TIP (tour into the picture) method was extended to implement a wide virtual environment. A virtual environment was built up by applying the extended TIP method to the panoramic images taken at a constant distance from a real road, and then, displayed 3-D navigation as clear as the real images. The car navigation system developed in this study provides the optimal driving direction and real-time traffic situation using 2-D navigation module and 3D navigation module.

  • PDF

Exploring the Influence of Virtual Reality and Augmented Reality on User Satisfaction in Virtual Tourism

  • Thich Van NGUYEN;Tho Van NGUYEN;Dat Van NGUYEN
    • Journal of Distribution Science
    • /
    • v.22 no.6
    • /
    • pp.33-44
    • /
    • 2024
  • Purpose: This study aims to measure how information quality, system quality, security, usefulness, and ease of use of Augmented Reality (VR) and Virtual Reality (AR) influence user satisfaction, motivating intelligent travel technology developers to improve VR/AR quality to meet customer requirements. Research design, data and methodology: This study investigates users interested in travelling in Ho Chi Minh City and Nha Trang City, Vietnam. The research model was implemented using an online questionnaire and face-to-face from 405 valid samples. To evaluate the scale's reliability, the study used the software SPSS 20. Test research hypotheses and evaluate measurement and structural models. This research uses AMOS 20 software. The proposed model is firmly grounded in the Information System Success model (ISS) and the Technology Acceptance Model (TAM), providing a solid theoretical foundation for our research. Results: Results show that consumer perceptions of information quality, system quality, security, usefulness, and ease of use have a positive impact on the perceived quality of VR/AR, thereby influencing tourists' travel intention. Conclusions: The results of this research enrich the theoretical understanding of consumer behaviour toward intelligent technology products in tourism, providing management implications for manufacturers to improve the quality of tourism products and satisfy user requirements in experience before considering choosing a destination.

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.