• Title/Summary/Keyword: virtual network

Search Result 1,540, Processing Time 0.032 seconds

Communcations protocol for virtual cellular network (VCN) (가상 셀룰라 망(VCN)을 위한 통신 프로토콜)

  • 정원영;정명순;김화종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2585-2593
    • /
    • 1997
  • Recently a new wireless communication architecture, a Virtual Cellular Network(VCN) was proposed in order to improve the preformance of a wireless network. Unlike a conventional cellular network, the VCN does not use a conventional frequency reuse concep. In the VCN, however, each mobile can use the entire system bandwidth. There is no pre-determined border of cells nor fixed based station for a mobile to communicate with. The performance of the VCN is improved by allowing any mobile to communicate with any port which residues in the virtual cell of the mobile. In this paepr, the Multi Packet Encoding (MPE) is proposed for the VCN uplink in order to improve the unfair throughput and delay caused by the position of the mobiles, and its performance is investigated via computer simulations. The Minimum Group(MG) is proposed for downlink protocol.

  • PDF

Wireless Extension of Profibus Network with Virtual Polling Mode (가상 폴링 모드를 애용한 Profibus 네트워크에 무선 확장)

  • Kim, Tae-Jun;Lee, Kyung-Chang;Kang, Song;Lee, Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.107-107
    • /
    • 2000
  • This paper focuses on a method to connect mobile devices such as mobile robot, ACV and UTC with Profibus network. In this paper, the IEEE 802.11 wireless LAN is used for wireless extension of Frofibus, and four major issues are introduced to implement the wireless extended Profibus; First, the integration method between Profibus and IEEE 802.11 is introduced. Second, the implementation method of gateway is proposed. Three, the virtual polling mode algorithm is developed for satisfaction of real-time characteristics required in industrial network. Finally, we implement a experimental model, and carried out the performance analysis of wireless extended Profibus. This results show that wireless extended Profibus is suitable to industrial network such as automated container terminal.

  • PDF

Keypoints-Based 2D Virtual Try-on Network System

  • Pham, Duy Lai;Ngyuen, Nhat Tan;Chung, Sun-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.186-203
    • /
    • 2020
  • Image-based Virtual Try-On Systems are among the most potential solution for virtual fitting which tries on a target clothes into a model person image and thus have attracted considerable research efforts. In many cases, current solutions for those fails in achieving naturally looking virtual fitted image where a target clothes is transferred into the body area of a model person of any shape and pose while keeping clothes context like texture, text, logo without distortion and artifacts. In this paper, we propose a new improved image-based virtual try-on network system based on keypoints, which we name as KP-VTON. The proposed KP-VTON first detects keypoints in the target clothes and reliably predicts keypoints in the clothes of a model person image by utilizing a dense human pose estimation. Then, through TPS transformation calculated by utilizing the keypoints as control points, the warped target clothes image, which is matched into the body area for wearing the target clothes, is obtained. Finally, a new try-on module adopting Attention U-Net is applied to handle more detailed synthesis of virtual fitted image. Extensive experiments on a well-known dataset show that the proposed KP-VTON performs better the state-of-the-art virtual try-on systems.

Trends and Prospects for the Development of Virtual Reality and Digital Property

  • Kirillova, Elena Anatolyevna;Blinkov, Oleg Evgenyevich;Blinkova, Elena Victorovna;Vrazhnov, Aleksey Sergeevich;Magomedov, Firdousi Bilyamudinovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.284-290
    • /
    • 2022
  • The study considers trends and prospects for developing virtual (augmented) reality and civil transactions in relation to digital property. In jurisprudence, there is a need to determine the legal status of virtual and augmented reality to regulate legal relations in the digital environment. Legal relations using new digital technologies require the creation of new legislative approaches and rules of their legal regulation. The article dwells on the legal status of virtual (augmented) reality and determines the methods of regulating legal relations in the sphere of digital property. The study utilized methods for collecting single and multiple facts in order to identify the main trends in the civil circulation of digital assets, as well as private law methods. The methods of generalization, concreteness, induction and deduction reveal the legal nature and main features of virtual (augmented) reality and digital property. The paper highlights the specifics of virtual reality and civil transactions in relation to digital assets. The research has concluded that the sale, exchange and other actions with digital objects in virtual reality have distinctive features, while digital property has also unique characteristics since it is involved in civil circulation and legal relations.

Advance Reservation Framework with Protection Management for Virtual Circuit Services (가상회선 서비스를 위해 보호 관리 기능을 갖는 사전 예약 프레임워크)

  • Lim, Huhnkuk;Lee, Kyungmin;Cha, Youngwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.902-910
    • /
    • 2013
  • The most representative research network in Korea, KREONET, has developed DynamicKL, an advance reservation based Network Service Agent (NSA) for user driven virtual circuit services. DynamicKL provides reservation, provisioning, release, termination, and inquiry web services for network resources by using an open standard network service interface (NSI), as well as web services for network resources by using a GUI interface. In addition, it has the RICE interface to support a protection management function per VC for virtual circuits and reservations. In this article, a protection management per VC for provisioned VCs and reservations is addressed in the DynamicKL framework, as a contribution to the VC protection management issue, which results in more manageable and reliable VC services compared to other advance reservation frameworks. An administrator can detect successful or unsuccessful VC protections in the event of a primary link failure and successful or unsuccessful VC retrievals after a primary link repair, by using RICE.

Distributed and Virtual Network Operations and Contents Management Based on Hybrid Research Networks (하이브리드 연구망 기반의 분산 가상형 네트워크 운영 및 리소스 정보 관리 기술 연구)

  • Kim, Dong-Kyun;Lee, Myung-Sun;Byeon, Ok-Hwan;Kim, Seung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.11-21
    • /
    • 2012
  • Hybrid network infrastructure has been deployed as the most important technology for the advanced research networking community such as Internet2, SURFnet, etc. However, further research needs to be performed in terms of feasible design and implementation of architecture for inter-domain collaborative network infrastructure, which is essential to end-to-end collaborative research based on high-end applications. In this paper, we suggest a framework for distributed and virtual network operations based on hybrid research networks and efficient cooperation between multi-domain hybrid networks, which aims to provide collaborative network environment for high-end applications. Suggested framework is designed to adopt decentralized model of multi-domain hybrid research network management. A collaborative and distributed virtual model that is characterized by cooperation among hybrid research networks that insist on maintaining their autonomy and control, can also contribute for researchers and other end-users to manage and operate their own virtual networks.

Investigating Islamic Studies Teachers' Attitudes Towards Utilizing Virtual Learning Environment in Distance Teaching among Primary Stage Pupils

  • Osama Mohamed Ahmed Salem;Mohammed bin Muthayb Al-Baqami
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.152-163
    • /
    • 2023
  • This research aimed at investigating Islamic Studies teachers' attitudes towards utilizing virtual learning environment in distance teaching among primary stage pupils. It also aimed at determining the statistical differences among variables due to sex, educational qualification, number of years of experience, and training sessions. This research adopted the descriptive approach. The sample consisted of male and female primary teachers of Islamic Studies (N=250) in governmental schools in Taif. The questionnaire was used as a main research tool. It included (20) items. Results showed that Islamic Studies teachers' attitudes towards utilizing virtual learning environment in distance teaching among primary stage pupils were ranked to a medium degree. There was a statistically significant difference among primary Islamic Studies teachers' attitudes due to sex variable. It was recommended to adopt more training sessions and seminars for adopting the idea of utilizing virtual learning environments among Islamic Studies teachers at boys' and girls' school in Mecca through emphasizing its significance and benefits in Teaching.

The Network Architecture and Protocol for Avatar Interaction in Distributed Virtual Environment (분산 가상공간내 분신간 상호작용을 위한 네트웍 구조 및 프로토콜 설계)

  • SUNG, ManKyu;PARK, ChanJong;KIM, DongHyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.47-54
    • /
    • 1998
  • The multi-user VR system can more enhance the sense of reality than existing single user VR system, but it also cause a significant problem about network structure and protocol, since the current Internet using TCP/IP can not afford to deliver such a massive information required to the real-time constraint of multi-user VR system. In this paper, we introduce new network structure and protocol for multiple user's virtual world navigation and interaction through their avatars. The virtual worlds are based on virtual building and managed by distributed servers. The avatars have 9 behaviors and recognize the state of each other by pre-defined network protocol.

  • PDF

Control Algorithm for Virtual Machine-Level Fairness in Virtualized Cloud Data center (가상화 클라우드 데이터센터에서 가상 머신 간의 균등한 성능 보장을 위한 제어 알고리즘)

  • Kim, Hwantae;Kim, Hwangnam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.6
    • /
    • pp.512-520
    • /
    • 2013
  • In this paper, the control algorithm which can resolve the unfairness in network performance of the virtual machine arised from the CPU scheduling in cloud datacenter has been proposed. We first describe the evaluation and analysis results of the network unfairness phenomenon of virtual machine through the heterogeneous cloud datacenter testbed and we propose the control algorithm which can guarantee the fairness of the network performance based on the PID control scheme. Through the implementation and evaluation results, we verify the performance of the proposed algorithm.

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.