• Title/Summary/Keyword: Image-virtualization

Search Result 20, Processing Time 0.021 seconds

A Method of Selecting Layered File System Based on Learning Block I/O History for Service-Customized Container (서비스 맞춤형 컨테이너를 위한 블록 입출력 히스토리 학습 기반 컨테이너 레이어 파일 시스템 선정 기법)

  • Yong, Chanho;Na, Sang-Ho;Lee, Pill-Woo;Huh, Eui-Nam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.415-420
    • /
    • 2017
  • Virtualization technique of OS-level is a new paradigm for deploying applications, and is attracting attention as a technology to replace traditional virtualization technique, VM (Virtual Machine). Especially, docker containers are capable of distributing application images faster and more efficient than before by applying layered image structures and union mount point to existing linux container. These characteristics of containers can only be used in layered file systems that support snapshot functionality, so it is required to select appropriate layered file systems according to the characteristics of the containerized application. We examine the characteristics of representative layered file systems and conduct write performance evaluations of each layered file systems according to the operating principles of the layered file system, Allocate-on-Demand and Copy-up. We also suggest the method of determining a appropriate layered file system principle for unknown containerized application by learning block I/O usage history of each layered file system principles in artificial neural network. Finally we validate effectiveness of artificial neural network created from block I/O history of each layered file system principles.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

A Hybrid Mapping Technique for Logical Volume Manager in SAN Environments (SAN 논리볼륨 관리자를 위한 혼합 매핑 기법)

  • 남상수;피준일;송석일;유재수;최영희;이병엽
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.99-113
    • /
    • 2004
  • A new architecture called SAN(Storage Area Network) was developed in response to the requirements of high availability of data, scalable growth, and system performance. In order to use SAN more efficiently, most of SAN operating softwares support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually h logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. A logical volume manager also supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add/remove storage devices to/from SAN even while the system is running. To support the snapshot and the on-line reorganization, most logical volume managers have used table based mapping methods. However, it is very difficult to manage mapping table because the mapping table is large in proportion to a storage capacity. In this paper, we design and implement an efficient and flexible hybrid mapping method based on mathematical equations. The mapping method in this paper supports a snapshot and on-line reorganization. The proposed snapshot and on-line reorganization are performed on the reserved area which is separated from data area of a volume. Due to this strategy normal I/O operations are not affected by snapshot and reorganization. Finally, we show the superiority of our proposed mapping method through various experiments.

Ukrainian Students' Analysis of Abuse Treatment by Parents: Retrospective and Perspective in Virtual and Real Environments

  • Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.197-207
    • /
    • 2022
  • Given the prevalence of violence in Ukrainian families, measures to prevent parental abusive treatment against children are urgent. It is important to study today's youth awareness about violence within families in order to enhance a culture of engagement with spouses and children in future. The aim of the study is to examine students' reflective experiences and their attitudes towards forms, frequency, causes and effects of parental abusive treatment. During the research the following methods were used step-by-step: theoretical analyses of scientific resources, anonymous questionnaire, quantitative and correlation analyses. According to result of survey 98 students who were interviewed, none of them fell victim of sexual abuse in their families. However, more than a half (51%) of the students surveyed experienced some forms of parental physical punishment. All the interviewed students encountered psychological cases of parental violence. The mostprevalent forms of parental abuse among the interviewees are criticism, negative comparison, emotional detachment, arrogance, intimidation, blackmail and humiliation. The most prevalent consequences of parental abuse among students are anxiety, low self-esteem, insecurity, impatience, suspiciousness, constraint in communication. Students agree that budget limitations, forced labor, criticism, spanking, emotional detachment, ignoring type of communication, reproach, blackmail are acceptable methods of punishment to use when raising their own children. These results clearly demonstrate the problem of the impact of parental abuse on children and its consequences in the future. A virtual dimension of the actualized problem is considered, namely: - virtualization of aggression and cruelty in the postmodern world. - the level of determining the factor of cruelty from the space of virtual culture. - the mirror image of everyday cruelty in the virtual environment; - the phenomenon of video games as a source and context of representation of the factor of cruelty in behavioral realities; - cybercrime as a virtualized result of cruelty in family and everyday realities. - futurological perspectives of virtualization of cruelty in communicative culture in general and in family relations in particular. The postmodern world is fundamentally different from the traditions and culture of the past, primarily due to the development of computer technologies and the virtualization of life in general. So, for example, virtual communities have become, in a certain way, another world, a second reality of life in general. And certain behavioral factors, in particular cruelty in the private environment, became a projection of such a phenomenon as cybercrime. Video games are a unique modern phenomenon, which multipolarly absorb all facets of human potential, communicative tendencies, behavioral and characterological factors, from the warmth of interpersonal relationships to the extreme degree of cruelty.

A Study on the Comparison of 3D Virtual Clothing and Real Clothing by Neckline Type (네크라인 종류에 따른 3D 가상착의와 실제착의 비교 연구)

  • Nam, Young-Ran;Kim, Dong-Eun
    • Fashion & Textile Research Journal
    • /
    • v.23 no.2
    • /
    • pp.247-260
    • /
    • 2021
  • While it is an important element of clothing construction, research has so far been very limited on the similarities between virtual and real clothing in terms of the type of neckline. The purpose of this study is to verify the similarity, accuracy of virtualization, and actuality of neckline, which all play an important role in individual impressions and image formation, and require considerable modification when fitting real samples. A total of 5 neckline models were selected through the analysis of dress composition textbooks. The selected designs were then planned and manufactured in muslin. The specimen clothes were then tested on a female model in her 20s. 2 kinds of virtual bodies were created in order to compare the real and the virtual dressing. The first virtual body was made through an Artec 3D Eva scan of the model, and the other was made by entering the model's measurements in a CLO 3D program. A visual image of the front, side, and back image of both the real and virtual dressing were subsequently collected. The collected images were then evaluated by 20 professional fashion workers who checked the similarity between the real and the virtual versions. The current study found that the similarity between the actual and virtual wearing of the five neckline designs with reality appeared higher with the virtual wearing image using the 3D-scanned body. The results of this study could provide further information on the selection of appropriate avatars to clothing companies that check the fit of clothing by utilizing 3D virtualized programs.

A Study on Implementation of Motion Graphics Virtual Camera with AR Core

  • Jung, Jin-Bum;Lee, Jae-Soo;Lee, Seung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.85-90
    • /
    • 2022
  • In this study, to reduce the time and cost disadvantages of the traditional motion graphic production method in order to realize the movement of a virtual camera identical to that of the real camera, motion graphics virtualization using AR Core-based mobile device real-time tracking data A method for creating a camera is proposed. The proposed method is a method that simplifies the tracking operation in the video file stored after shooting, and simultaneously proceeds with shooting on an AR Core-based mobile device to determine whether or not tracking is successful in the shooting stage. As a result of the experiment, there was no difference in the motion graphic result image compared to the conventional method, but the time of 6 minutes and 10 seconds was consumed based on the 300frame image, whereas the proposed method has very high time efficiency because this step can be omitted. At a time when interest in image production using virtual augmented reality and various studies are underway, this study will be utilized in virtual camera creation and match moving.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

A Virtualized Kernel for Effective Memory Test (효과적인 메모리 테스트를 위한 가상화 저널)

  • Park, Hee-Kwon;Youn, Dea-Seok;Choi, Jong-Moo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.12
    • /
    • pp.618-629
    • /
    • 2007
  • In this paper, we propose an effective memory test environment, called a virtualized kernel, for 64bit multi-core computing environments. The term of effectiveness means that we can test all of the physical memory space, even the memory space occupied by the kernel itself, without rebooting. To obtain this capability, our virtualized kernel provides four mechanisms. The first is direct accessing to physical memory both in kernel and user mode, which allows applying various test patterns to any place of physical memory. The second is making kernel virtualized so that we can run two or more kernel image at the different location of physical memory. The third is isolating memory space used by different instances of virtualized kernel. The final is kernel hibernation, which enables the context switch between kernels. We have implemented the proposed virtualized kernel by modifying the latest Linux kernel 2.6.18 running on Intel Xeon system that has two 64bit dual-core CPUs with hyper-threading technology and 2GB main memory. Experimental results have shown that the two instances of virtualized kernel run at the different location of physical memory and the kernel hibernation works well as we have designed. As the results, the every place of physical memory can be tested without rebooting.

A scheme of Docker-based Version Control for Open Source Project (오픈 소스 프로젝트를 위한 도커 기반 버전 관리 기법)

  • Lee, Yong-Jeon;Rim, Seong-Rak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.8-14
    • /
    • 2016
  • When Open Source Projects are processed by multiple developers, the Version Control Systems, which control the different versions of the same file being used, is a very useful tool. On the other hand, because most of conventional VCS(SVN, Git, etc.) mainly control the history of the modifications of the source codes or documents, there is an inconvenience that each developer should modify the development environment whenever the development environment is modified. To overcome this inconvenience, this paper suggests a scheme of VC for OSP. The basic concept of the suggested scheme is that an image, including the development environment and controls, is created as a new version using the Docker, virtualization tool of the container method. To review the functional appropriateness of the suggested scheme, after establishing the Docker on the hosts that use the different OS( Ubuntu12.0.4, CentOS7), this study tested a VC that could control the different versions including the history of modifications of the development environment and evaluated them by a comparison with the conventional VCS. The results show that the suggested scheme is a convenient scheme of VC for the OSP.

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.