• Title/Summary/Keyword: Online Mapping

Search Result 57, Processing Time 0.032 seconds

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Cloud Based Simultaneous Localization and Mapping with Turtlebot3 (Turtlebot3을 사용한 클라우드 기반 동시 로컬라이제이션 및 매핑)

  • Ahmed, Hamdi A.;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.241-243
    • /
    • 2018
  • In this paper, in Simultaneous localization and mapping (SLAM), the robot acquire its map of environment while simultaneously localizing itself relative to the map. Cloud based SLAM, allows us to optimizing resource and data sharing like map of the environment, which allows us, as one of shared available online map. Doing so, unless we add or remove significant change in our environment, the essence of rebuilding new environmental map are omitted to new mobile robot added to the environment. As result, the requirement of additional sensor are curtailed.

  • PDF

Solution Space of Inverse Differential Kinematics (역미분기구학의 해 공간)

  • Kang, Chul-Goo
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.4
    • /
    • pp.230-244
    • /
    • 2015
  • Continuous-path motion control such as resolved motion rate control requires online solving of the inverse differential kinematics for a robot. However, the solution space of the inverse differential kinematics related to Jacobian J is not well-established. In this paper, the solution space of inverse differential kinematics is analyzed through categorization of mapping conditions between joint velocities and end-effector velocity of a robot. If end-effector velocity is within the column space of J, the solution or the minimum norm solution is obtained. If it is not within the column space of J, an approximate solution by least-squares is obtained. Moreover, this paper introduces an improved mapping diagram showing orthogonality and mapping clearly between subspaces, and concrete examples numerically showing the concept of several subspaces. Finally, a solver and graphics user interface (GUI) for inverse differential kinematics are developed using MATLAB, and the solution of inverse differential kinematics using the GUI is demonstrated for a vertically articulated robot.

Reliability-aware service chaining mapping in NFV-enabled networks

  • Liu, Yicen;Lu, Yu;Qiao, Wenxin;Chen, Xingkai
    • ETRI Journal
    • /
    • v.41 no.2
    • /
    • pp.207-223
    • /
    • 2019
  • Network function virtualization can significantly improve the flexibility and effectiveness of network appliances via a mapping process called service function chaining. However, the failure of any single virtualized network function causes the breakdown of the entire chain, which results in resource wastage, delays, and significant data loss. Redundancy can be used to protect network appliances; however, when failures occur, it may significantly degrade network efficiency. In addition, it is difficult to efficiently map the primary and backups to optimize the management cost and service reliability without violating the capacity, delay, and reliability constraints, which is referred to as the reliability-aware service chaining mapping problem. In this paper, a mixed integer linear programming formulation is provided to address this problem along with a novel online algorithm that adopts the joint protection redundancy model and novel backup selection scheme. The results show that the proposed algorithm can significantly improve the request acceptance ratio and reduce the consumption of physical resources compared to existing backup algorithms.

Mapping Emerging Business Models in Massively Multiplayer Online Games (다중이용자 온라인 게임에서 신규 비즈니스 모델의 도식화에 관하여)

  • Joung, Yoon-Ho
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.60-65
    • /
    • 2006
  • The authors map some of the current Business Models in the Massively Multiplayer Online Player scenario. These maps represent Value Creation Systems by resorting to Value Net constructs and notations, and are offered here as a proof of concept and utility. The authors claim that these mappings can enable readers, managers and IT experts, to build new insights onto such Business Models and develop requirements for Information System infrastructure. When approaching the Value Creation System as a Value Net the goal is to think outside the conceptual box of Value Chains and understand how the different activities interact, by exposing the multiplicity of value types and flows. In doing this study the authors are attempting to synthesize a new Business Model proposal that could underlie the development of an infrastructure for the collaborative creation, distribution and exploration of online massively multiplayer games, beyond the traditional producer-consumer roles.

  • PDF

Examining Interaction Patterns in Online Discussion through Multiple Lenses

  • HAN, Seungyeon
    • Educational Technology International
    • /
    • v.15 no.2
    • /
    • pp.117-141
    • /
    • 2014
  • This qualitative study investigated different interaction patterns in an online discussion. The data was collected from asynchronous discussion occurred in a graduate course. The data analysis methods include inductive analysis and mapping strategy. The results of the study suggest three layers of interaction: response sequences, interaction amongst participants, and concept map of messages. The visualization of response sequences enabled the researcher to discover complex and dynamic interaction patterns amongst participants. The many-to-many communication feature of online discussion does not always enable direct one-on-one interaction between two participants. Rather, one message contributed to multiple threads in the stream of conversation. In terms of interaction amongst participants, the interaction amongst participants, as indicated in the data, the messages also bind each participant and consequently a group(s) of participants together. It appears that the contribution of one message may not only enable a response to one participant, but also connect many participants to each other. The concept map of messages proposes that response sequences and interaction amongst participants can also be viewed between concepts within messages in the discussion. On the surface, the messages posted by individuals are linked by the system in a linear fashion as they are posted. However, the interaction extends to collaborative conversation amongst participants. Ultimately, a conceptual network of interrelated ideas including multiple perspectives is built in asynchronous discussion.

Visual SLAM using Local Bundle Optimization in Unstructured Seafloor Environment (국소 집단 최적화 기법을 적용한 비정형 해저면 환경에서의 비주얼 SLAM)

  • Hong, Seonghun;Kim, Jinwhan
    • The Journal of Korea Robotics Society
    • /
    • v.9 no.4
    • /
    • pp.197-205
    • /
    • 2014
  • As computer vision algorithms are developed on a continuous basis, the visual information from vision sensors has been widely used in the context of simultaneous localization and mapping (SLAM), called visual SLAM, which utilizes relative motion information between images. This research addresses a visual SLAM framework for online localization and mapping in an unstructured seabed environment that can be applied to a low-cost unmanned underwater vehicle equipped with a single monocular camera as a major measurement sensor. Typically, an image motion model with a predefined dimensionality can be corrupted by errors due to the violation of the model assumptions, which may lead to performance degradation of the visual SLAM estimation. To deal with the erroneous image motion model, this study employs a local bundle optimization (LBO) scheme when a closed loop is detected. The results of comparison between visual SLAM estimation with LBO and the other case are presented to validate the effectiveness of the proposed methodology.

Features, Functions and Components of a Library Classification System in the LIS tradition for the e-Environment

  • Satija, M.P.;Martinez-Avila, Daniel
    • Journal of Information Science Theory and Practice
    • /
    • v.3 no.4
    • /
    • pp.62-77
    • /
    • 2015
  • This paper describes qualities of a library classification system that are commonly discussed in the LIS tradition and literature, and explains such a system’s three main functions, namely knowledge mapping, information retrieval, and shelf arrangement. In this vein, the paper states the functional requirements of bibliographic classifications, which broadly are subject collocation and facilitation of browsing the collection. It explains with details the components of a library classification system and their functions. The major components are schedules, notations, and index. It also states their distinguished features, such as generalia class, form divisions, book numbers, and devices for number synthesis which are not required in a knowledge classification. It illustrates with examples from the WebDewey good examples of added features of an online library classification system. It emphasizes that institutional backup and a revision machinery are essential for a classification to survive and remain relevant in the print and e-environment.

Trend-Casting in the Interactive Digital Media Industry: Some Results and Guidelines

  • Sharma, Ravi S.;Yi, Yang
    • Asian Journal of Innovation and Policy
    • /
    • v.2 no.1
    • /
    • pp.20-36
    • /
    • 2013
  • In this practice article, we present the results of a scenario planning approach that is a hybrid of the three main schools of thought. Our research objective was to study the future of Interactive Digital Media applications such as online music, on-demand television and massively multi-player online role-playing games. Our approach, while essentially qualitative in nature, nevertheless draws from the rigors of the quantitative school in identifying and then tracking the significant dimensions of analysis that emerge over time as strands of events leading to plausible scenarios. Our empirical analysis revealed mapping strands to three themes - ownership, distribution and innovation - which we used in an expert validation exercise to formulate scenarios. We present and discuss the major findings and implications of this empirical investigation. In a nutshell, we conjecture that an open, competitive IDM marketplace with performance safeguards may serve both and lead to a win-win scenario. While there are differences among IDM sectors, a unified approach to regulation and policy would be effective.

The Effectiveness of a Cultural Competence Training Program for Public Health Nurses using Intervention Mapping

  • Kim, Yune Kyong;Lee, Hyeonkyeong
    • Research in Community and Public Health Nursing
    • /
    • v.27 no.4
    • /
    • pp.410-422
    • /
    • 2016
  • Purpose: This study evaluated the effects of a cultural competence training program for public health nurses (PHNs) using intervention mapping. Methods: An embedded mixed method design was used. Forty-one PHNs (experimental: 21, control: 20) and forty marriage migrant women (MMW) (20, in each group) who were provided nursing care by PHN participated in the study. The experimental group was provided with a four-week cultural competence program consisting of an eight hour offline and online course, e-mail newsletters and social networking services (BAND). Transcultural Self-efficacy (TSE) of the PHNs, client-nurse trust, and satisfaction with nursing care of MMW were measured. Ten PHNs in the experimental group were interviewed after the experimental study. Results: The experimental group showed a significantly greater improvement in TSE, client-nurse trust, and satisfaction with nursing care than did the control group. Six themes emerged from qualitative data: (a) Recognizing cultural differences, (b) Being interested in the multicultural policy, (c) Trying to communicate in MMW's own language, (d) Providing medical information using internet and smart phone, (e) Embracing culturally diverse people into society, and (f) Requiring ongoing cultural competence training. Conclusion: Cultural competence training enabled PHNs to provide culturally competent care and contribute to MMW's health outcomes.