• Title/Summary/Keyword: 가상 서버

Search Result 626, Processing Time 0.025 seconds

Network Traffic Control for War-game Simulation in Distributed Computing Environment (분산 컴퓨팅 환경에서의 워게임 시뮬레이션을 위한 네트워크 트래픽 제어)

  • Jang, Sung-Ho;Kim, Tae-Young;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.1-8
    • /
    • 2009
  • The distributed war-game simulation system has been used to represent the virtual battlefield environment. In order to produce a simulation result, simulators connected from a network transfer messages with location information of simulated objects to a central simulation server. This network traffic is an immediate cause of system performance degradation. Therefore, the paper proposes a system to manage and control network traffic generated from distributed war-game simulation. The proposed system determines the moving distance of simulated objects and filters location messages by a distance threshold which is controlled according to system conditions like network traffic and location error. And, the system predicts the next location of simulated objects to minimize location error caused by message filtering. Experimental results demonstrate that the proposed system is effective to control the network traffic of distributed war-game simulation systems and reduce the location error of simulated objects.

Road Image Recognition Technology based on Deep Learning Using TIDL NPU in SoC Enviroment (SoC 환경에서 TIDL NPU를 활용한 딥러닝 기반 도로 영상 인식 기술)

  • Yunseon Shin;Juhyun Seo;Minyoung Lee;Injung Kim
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.25-31
    • /
    • 2022
  • Deep learning-based image processing is essential for autonomous vehicles. To process road images in real-time in a System-on-Chip (SoC) environment, we need to execute deep learning models on a NPU (Neural Procesing Units) specialized for deep learning operations. In this study, we imported seven open-source image processing deep learning models, that were developed on GPU servers, to Texas Instrument Deep Learning (TIDL) NPU environment. We confirmed that the models imported in this study operate normally in the SoC virtual environment through performance evaluation and visualization. This paper introduces the problems that occurred during the migration process due to the limitations of NPU environment and how to solve them, and thereby, presents a reference case worth referring to for developers and researchers who want to port deep learning models to SoC environments.

Design for Proximity Voice Chat System in Multimedia Environments

  • Jae-Woo Chang;Jin-Woong Kim;Soo Kyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.83-90
    • /
    • 2024
  • In this paper, we propose a solution to apply a proximity voice dialog system to voice dialog technology, one of the interaction systems in multimedia environments. A voice dialog between multiple users in a multimedia space is designed by adjusting the volume of the voice according to the distance between the user avatars and muting the user who is beyond the audible distance. The main feature of this research is a reliable UDP-based active server system that delivers low-quality voice data to users who are far away based on distance and does not transmit voice data to users who enter the inaudible area for economic development. The performance of the proposed system was measured in a previously completed project based on the Unity game engine, and it is expected that the system proposed in this research will be actively used in environments that provide interaction between multiple users such as met averse content and real-time battle action games.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

A Study on the Improvement Scheme of University's Software Education

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.243-250
    • /
    • 2020
  • In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.

A Study on the Cloud Service Model of CaaS Based on the Object Identification, ePosition, with a Structured Form of Texts (문자열로 구조화된 사물식별아이디 이포지션(ePosition) 기반의 클라우드 CaaS(Contents as a Service) 서비스 모델에 관한 연구)

  • Lee, Sang-Zee;Kang, Myung-Su;Cho, Won-Hee
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.129-139
    • /
    • 2013
  • The Internet of Things (or IoT for short) which refers to uniquely identifiable objects and their virtual representations in an Internet-like structure is to be reality today. The amount of data on IoT is expected to increase abruptly and there are several key issues like usefulness interoperability between multiple distributes systems, services and databases. In this paper a methodology is proposed to realize a recently developed cloud service model, Contents as a Service (CaaS), which is contents delivery model referred to as 'on-demand contents'. In the proposed method, the global object identification, ePosition, comprising the structured form of two sorts of text strings with a separation symbol like # is applied to identify a specific content and registered with the content at the same server. It is easy-to-realize and effective to solve the interoperability problem systematically and logically. Some APIs for the proposed CaaS service are to be converged to provide some upgraded cloud service model such as 'CaaS supported SaaS' and 'CaaS supported PaaS'.

  • PDF

Efficient Virtual Machine Migration for Mobile Cloud Using PMIPv6 (모바일 클라우드 환경에서 PMIPv6를 이용한 효율적인 가상머신 마이그레이션)

  • Lee, Tae-Hee;Na, Sang-Ho;Lee, Seung-Jin;Kim, Myeong-Eeob;Huh, Eui-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.806-813
    • /
    • 2012
  • In a cloud computing environment, various solutions were introduced to provide the service to users such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) and Desktop as a Service (DaaS). Nowadays, Mobile as a Service (MaaS) to provide the mobility in a cloud environment. In other words, users must have access to data and applications even when they are moving. Thus, to support the mobility to a mobile Thin-Client is the key factor. Related works to support the mobility for mobile devices were Mobile IPv6 and Proxy Mobile IPv6 which showed performance drawbacks such as packet loss during hand-over which could be very critical when collaborating with cloud computing environment. The proposed model in this paper deploys middleware and replica servers to support the data transmission among cloud and PMIPv6 domain. It supports efficient mobility during high-speed movement as well as high-density of mobile nodes in local mobility anchor. In this paper, through performance evaluation, the proposed scheme shows the cost comparison between previous PMIPv6 and verifies its significant efficiency.

Cyber-Lecture Management System based on XML (XML 기반의 사이버 강좌관리 시스템)

  • Kim, Hye-Young;Kim, Hwa-Sun;Kim, Heung-Sik;Kim, Sang-Gyun;Choi, Heung-Kook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.529-538
    • /
    • 2003
  • The speedy development of the world-wide web is rapidly growing the internet-based tools for the remote instruction. In interchanging and expressing the information of one another on the web, it is produced through the form of HTML(Hyoertext Text Markup Language). However, the structural disadvantage of the HTML is becoming to require a powerful XML(eXtensible Markup Language) which can store all the sphere of data, and transform them into another form. Nevertheless, because the powerful XML(eXtensible Markup Language). However necessary that XML standard should be applied appropriately. Because existing lecture data of cyber education sites cannot be shared, the users should passively use only the functions offered by cyber school. To solve the problem of this limit, in this study, the standardized data structure for XML is defined, and system model for processing between the server and the client is provided. By storing the lecture data of cyber education sites as XML on the web, stored data came to be reused without changing on any site. In the view of Users, they could used the Internet service with equipment that they want at any place and any time. To control any kinds of CK\LMS(Cyber Lecture Management System) for Administrator and Users, we offered a variety of Multimedia applications and an easy interface and built a new style of CLMS. Therefore, by strong and extracting the data related with the virtual education of the secondary school through the form of XML, for the effective interchange and sharing of the information, maximum utilization of the information can be achieved.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.