• Title/Summary/Keyword: Virtual key

Search Result 516, Processing Time 0.032 seconds

Adaptive Scheduling for QoS-based Virtual Machine Management in Cloud Computing

  • Cao, Yang;Ro, Cheul Woo
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.7-11
    • /
    • 2012
  • Cloud Computing can be viewed as a dynamically-scalable pool of resources. Virtualization is one of the key technologies enabling Cloud Computing functionalities. Virtual machines (VMs) scheduling and allocation is essential in Cloud Computing environment. In this paper, two dynamic VMs scheduling and allocating schemes are presented and compared. One dynamically on-demand allocates VMs while the other deploys optimal threshold to control the scheduling and allocating of VMs. The aim is to dynamically allocate the virtual resources among the Cloud Computing applications based on their load changes to improve resource utilization and reduce the user usage cost. The schemes are implemented by using SimPy, and the simulation results show that the proposed adaptive scheme with one threshold can be effectively applied in a Cloud Computing environment both performance-wise and cost-wise.

A study on SLA(Scanned Linear Array) Applications for Mobile Communication Units (이동통신 단말기용 SLA(Scanned Linear Array) 적용에 관한 연구)

  • 김인회;안원석;문현찬
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1998.06a
    • /
    • pp.275-278
    • /
    • 1998
  • In recent years, miniaturization has become the key factor in the development of mobile communication system. Portable communications and computing devices suffer from two conflicting requirements which are device size to be as small as possible and large, high resolution display. These problems can be solved by virtual display. Any display in which the user views an image through an optical system is a virtual display. It provides a display which is high resolution, appears large to the viewer and at the same time occupies little physical space. In this study, handhold units of mobile communication was investigated through use of the SLA(Scanned Linear Array). The basic SLA mechanism comprises a linear array of LED's, a magnifying lens, and a scan mirror. To optimize virtual image, we investigated optical system design and operating condition for each part.

  • PDF

Virtual Nail Art Using Nail Detection (손톱 검출을 이용한 가상 네일아트)

  • Mun, Sae-byeol;Heo, Hoon;Oh, Jeong-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.413-415
    • /
    • 2021
  • This paper proposes a nail detection algorithm using OpenPose and implements virtual nail art using it. Based on the key points detected by OpenPose, the finger area is detected using skin color characteristics for each finger. The nail region is detected from the edge image of the detected finger region. Then, a virtual nail art is implemented by synthesizing nail tips in the nail area. In a somewhat controlled shooting environment, simulation results show that the proposed algorithm detects nail areas well and implements virtual nail art well.

  • PDF

Action Recognition with deep network features and dimension reduction

  • Li, Lijun;Dai, Shuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.832-854
    • /
    • 2019
  • Action recognition has been studied in computer vision field for years. We present an effective approach to recognize actions using a dimension reduction method, which is applied as a crucial step to reduce the dimensionality of feature descriptors after extracting features. We propose to use sparse matrix and randomized kd-tree to modify it and then propose modified Local Fisher Discriminant Analysis (mLFDA) method which greatly reduces the required memory and accelerate the standard Local Fisher Discriminant Analysis. For feature encoding, we propose a useful encoding method called mix encoding which combines Fisher vector encoding and locality-constrained linear coding to get the final video representations. In order to add more meaningful features to the process of action recognition, the convolutional neural network is utilized and combined with mix encoding to produce the deep network feature. Experimental results show that our algorithm is a competitive method on KTH dataset, HMDB51 dataset and UCF101 dataset when combining all these methods.

A Study on Defense Technique Against Use-After-Free Attacks Using MTE (MTE 를 활용한 사용 후 해제 공격 방어기법 연구)

  • Yunseong Hwang;Junseung You;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.279-282
    • /
    • 2024
  • The Use-after-free (UAF) bug is a long-standing temporal memory safety issue. To prevent UAF attacks, two commonly used approaches are lock-and-key and pointer nullification. Recently, ARM architecture supports the Memory Tagging Extension (MTE) that implemented a lock-and-key mechanism using a 4-bit tag during memory access. Previous research proposed a virtual address tagging scheme utilizing MTE to prevent UAF attacks. In this paper, we aimed to measure a simplified version of the previously proposed virtual address tagging scheme on real machines supporting MTE by implementing a simple module and conducting experiments.

The Effects of the Virtual Avatar Fitting Models for Apparel e-Commerce in Consumer's Purchasing Behavior: Comparing Traditional Model with Virtual Avatar Model (의류 인터넷 쇼핑몰의 가상 아바타 피팅 모델이 소비자 구매행동에 미치는 영향연구: 기존 온라인 쇼핑몰 모델과 가상 피팅 아바타 모델 비교)

  • Hwang, Suyeon;Shin, Sangmoo
    • Journal of Fashion Business
    • /
    • v.17 no.5
    • /
    • pp.57-69
    • /
    • 2013
  • The purpose of this study is to compare the traditional shopping model and virtual avatar fitting model with regards to credibility and favorable impression effects on shopping mall satisfaction, product preferences, and purchasing intentions of apparel e-commerce. Questionnaires are distributed to 10-30s years old consumers who live in Seoul. Data are analyzed by descriptive statistics, Cronbach's ${\alpha}$, and regression analysis. The results are that the provoked credibility and favorable impression from the traditional shopping model affects the consumers' shopping mall satisfaction and buying intention in descending order. In additional, the credibility from traditional shopping model affects the product preference. The provoked credibility from the virtual fitting model influences the consumers' product preferences, and buying intentions. The favorable impression from the virtual fitting model affects shopping mall satisfaction. In general, provoked credibility from virtual avatar fitting model and traditional shopping model play key roles which could influence the consumers' buying intention.

Efficient Packet Scheduling Algorithm using Virtual Start Time for High-Speed Packet Networks (고속 패킷망에서 효율적인 가상 시작 시간 기반 패킷 스케줄링 알고리즘)

  • Ko, Nam-Seok;Gwak, Dong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3B
    • /
    • pp.171-182
    • /
    • 2003
  • In this paper, we propose an efficient and simple fair queueing algorithm, called Minimum Possible Virtual Start Time Fair Queueing (MPSFQ), which has O(1) complexity for the virtual time computation while it has good delay and fairness properties. The key idea of MPSFQ is that it has an easy system virtual time recalibration method while it follows a rate-proportional property. MPSFQ algorithm recalibrates system virtual time to the minimum possible virtual start time of all backlogged sessions. We will show our algorithm has good delay and fairness properties by analysis.

Virtual Environment Modeling for Battery Management System

  • Piao, Chang-Hao;Yu, Qi-Fan;Duan, Chong-Xi;Su, Ling;Zhang, Yan
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.5
    • /
    • pp.1729-1738
    • /
    • 2014
  • The offline verification of state of charge estimation, power estimation, fault diagnosis and emergency control of battery management system (BMS) is one of the key technologies in the field of electric vehicle battery system. It is difficult to test and verify the battery management system software in the early stage, especially for algorithms such as system state estimation, emergency control and so on. This article carried out the virtual environment modeling for verification of battery management system. According to the input/output parameters of battery management system, virtual environment is determined to run the battery management system. With the integration of the developed BMS model and the external model, the virtual environment model has been established for battery management system in the vehicle's working environment. Through the virtual environment model, the effectiveness of software algorithm of BMS was verified, such as battery state parameters estimation, power estimation, fault diagnosis, charge and discharge management, etc.

Exploring Perceptions of 'Foreignness' in Virtual Teams: Its Impact on Team Member Satisfaction and Turnover Intention

  • Garrison, Gary;Wakefield, Robin L.;Harvey, Michael;Kim, Sang-Hyun
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.101-125
    • /
    • 2010
  • This paper uses the status inconsistency theory to identify factors related to team members' (dis)satisfaction with the composition of virtual IT project teams in order to predict their turnover intentions. Our approach is based on the premise that virtual teams, although increasingly popular among global organizations, create an environment replete with cultural and functional diversity. Yet, a paradox exists: increasing diversity in virtual teams maximizes the creation and use of organizational knowledge while simultaneously increasing dissatisfaction and turnover. This is a critical issue in the formation and management of virtual teams. Therefore, we investigate how team members' perceptions of differences among themselves (i.e. foreignness) impact the stability of team membership, leading to what we describe as a 'liability of foreignness.' Findings indicate that a member's perception of foreignness has a detrimental effect on satisfaction with his or her team members while satisfaction is likely to decrease turnover intention. This may be an implication that managers need to maintain a balance in order to discourage member turnover and the loss of key players.

Protecting Technique for the Executable File of Virtual Machines (가상기계 실행파일을 위한 보호 기법)

  • Park, Ji-Woo;Yi, Chang-Hwan;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.668-678
    • /
    • 2007
  • The development of a wire and wireless communication technologies might permit easily accessing on various information. But, the easiness of accessing information has basically the problem of an unintended information outflow. An executable file which has key algorithms, data and resources for itself has very weak point in the security. Because the various information such as algorithms, data and resources is included in an executable file on embedded systems or virtual machines, the information outflow problem may appear more seriously. In this paper, we propose a technique which can be protecting the executable file contents for resolving the outflow problem through the encryption. Experimentally, we applied the proposed technique to EVM-the virtual machine for embedded system and verified it. Also, we tried a benchmark test for the proposed technique and obtained reasonable performance overhead.

  • PDF