• Title/Summary/Keyword: virtual network

Search Result 1,540, Processing Time 0.029 seconds

Remote Monitoring and Control of the Real Robot associated with a Virtual Robot

  • Jeon, Byung-Joon;Kim, Dong-Hwan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.43-48
    • /
    • 2005
  • A robot system encompassing a remote control and monitoring through a virtual robot design is addressed and a tracking problem for a 2D (2 dimension) moving target by a robot vision is chosen as a case study. The virtual robot is developed, and it synchronizes with the real robot by compensating delay time. Two systems are displayed on a remote panel by communicating command and image data. The virtual robot utilizes an OpenGL library in Visual $C^{++}$ environment. Additionally, the remote monitoring and control between the real robot and the virtual robot are accomplished by employing an appropriate data compression in a network communication.

  • PDF

Value Complexity of Virtual Communities and Information Security in the Postmodern World: Semantic Focus and Language Innovations

  • Khrypko, Svitlana;ALEKSANDROVA, Olena;Stoliarchuk, lesia;Ishchuk, Olena;OBLOVA, Liudmyla;Pavlovska, Olena;Andrii, Bezuhlyi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.712-718
    • /
    • 2021
  • Virtual communities are studied to analyze their characteristic features, types, and tole to modern society. The article is aimed at creating a classification of virtual communities according to specific characteristics, which can be used to model the interaction, and necessity of components that are important for the community. The classification of virtual communities will contribute to their better performance and satisfy the users' needs in information. The study reveals the value structure of virtual communities, educational and communicative influence, and the possible threats these communities may bring to society and security.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Dynamic data Path Prediction in Network Virtual Environment

  • Jeoung, You-Sun;Ra, Sang-Dong
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.83-87
    • /
    • 2007
  • This research studies real time interaction and dynamic data shared through 3D scenes in virtual network environments. In a distributed virtual environment of client-server structure, consistency is maintained by the static information exchange; as jerks occur by packet delay when updating messages of dynamic data exchanges are broadcasted disorderly, the network bottleneck is reduced by predicting the movement path by using the Dead-reckoning algorithm. In Dead-reckoning path prediction, the error between the estimated and the actual static values which is over the threshold based on the shared object location requires interpolation and multicasting of the previous location by the ESPDU of DIS. The shared dynamic data of the 3D virtual environment is implementation using the VRML.

Design and Implementation of iSCSI Protocol Based Virtual USB Drive for Mobile Devices (모바일 장치를 위한 iSCSI 프로토콜 기반의 가상 USB 드라이브 설계 및 구현)

  • Choi, Jae-Hyun;Nam, Young Jin;Kim, JongWan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.175-184
    • /
    • 2010
  • This paper designs a virtual USB drive for mobile devices which gives an illusion of a traditional USB flash memory drive and provides capacity-free storage space over IP network. The virtual USB drive operating with a S3C2410 hardware platform and embedded linux consists of USB device driver, an iSCSI-enabled network stack, and a seamless USB/iSCSI tunneling module. For performance enhancement, it additionally provides a kernel-level seamless USB/iSCSI tunneling module and data sharing with symbol references among kernel modules. Experiments reveal that the kernel-level implementation can improve the I/O performance up to 8 percentage, as compared with the user-level implementation.

Implementation of an Autostereoscopic Virtual 3D Button in Non-contact Manner Using Simple Deep Learning Network

  • You, Sang-Hee;Hwang, Min;Kim, Ki-Hoon;Cho, Chang-Suk
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.505-517
    • /
    • 2021
  • This research presented an implementation of autostereoscopic virtual three-dimensional (3D) button device as non-contact style. The proposed device has several characteristics about visible feature, non-contact use and artificial intelligence (AI) engine. The device was designed to be contactless to prevent virus contamination and consists of 3D buttons in a virtual stereoscopic view. To specify the button pressed virtually by fingertip pointing, a simple deep learning network having two stages without convolution filters was designed. As confirmed in the experiment, if the input data composition is clearly designed, the deep learning network does not need to be configured so complexly. As the results of testing and evaluation by the certification institute, the proposed button device shows high reliability and stability.

Edge Computing Server Deployment Technique for Cloud VR-based Multi-User Metaverse Content (클라우드 VR 기반 다중 사용자 메타버스 콘텐츠를 위한 엣지 컴퓨팅 서버 배치 기법)

  • Kim, Won-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1090-1100
    • /
    • 2021
  • Recently, as indoor activities increase due to the spread of infectious diseases, the metaverse is attracting attention. Metaverse refers to content in which the virtual world and the real world are closely related, and its representative platform technology is VR(Virtual Reality). However, since VR hardware is difficult to access in terms of cost, the concept of streaming-based cloud VR has emerged. This study proposes a server configuration and deployment method in an edge network when metaverse content involving multiple users operates based on cloud VR. The proposed algorithm deploys the edge server in consideration of the network and computing resources and client location for cloud VR, which requires a high level of computing resources while at the same time is very sensitive to latency. Based on simulation, it is confirmed that the proposed algorithm can effectively reduce the total network traffic load regardless of the number of applications or the number of users through comparison with the existing deployment method.

A Segmentation Guided Coarse to Fine Virtual Try-on Network for a new Clothing and Pose

  • Sandagdorj, Dashdorj;Tuan, Thai Thanh;Ahn, Heejune
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.33-36
    • /
    • 2020
  • Virtual try on is getting interested from researchers these days because its application in online shopping. But single pose virtual try on is not enough, customer may want to see themselves in different pose. Multiple pose virtual try on is getting input as customer image, an in-shop cloth and a target pose, it will try to generate realistic customer wearing the in-shop cloth with the target pose. We first generate the target segmentation layout using conditional generative network (cGAN), and then the in-shop cloth are warped to fit the customer body in target pose. Finally, all the result will be combine using a Resnet-like network. We experiment and show that our method outperforms stage of the art.

  • PDF

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

A Study on Traffic Volume Prediction for e-Commerce Systems (전자상거래 시스템의 트래픽량 예측에 관한 연구)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.31-44
    • /
    • 2011
  • The applicability of network-based computing depends on the availability of the underlying network bandwidth. Such a growing gap between the capacity of the backbone network and the end users' needs results in a serious bottleneck of the access network in between. As a result, ISP incurs disadvantages in their business. If this situation is known to ISP in advance, or if ISP is able to predict traffic volume end-to-end link high-load zone, ISP and end users would be able to decrease the gap for ISP service quality. In this paper, simulation tools, such as ACE, ADM, and Flow Analysis, were used to be able to perceive traffic volume prediction and end-to-end link high-load zone. In using these simulation tools, we were able to estimate sequential transaction in real-network for e-Commerce. We also imported virtual network environment estimated network data, and create background traffic. In a virtual network environment like this, we were able to find out simulation results for traffic volume prediction and end-to-end link high-load zone according to the increase in the number of users based on virtual network environment.