• 제목/요약/키워드: Virtual network

검색결과 1,535건 처리시간 0.034초

Remote Monitoring and Control of the Real Robot associated with a Virtual Robot

  • Jeon, Byung-Joon;Kim, Dong-Hwan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.43-48
    • /
    • 2005
  • A robot system encompassing a remote control and monitoring through a virtual robot design is addressed and a tracking problem for a 2D (2 dimension) moving target by a robot vision is chosen as a case study. The virtual robot is developed, and it synchronizes with the real robot by compensating delay time. Two systems are displayed on a remote panel by communicating command and image data. The virtual robot utilizes an OpenGL library in Visual $C^{++}$ environment. Additionally, the remote monitoring and control between the real robot and the virtual robot are accomplished by employing an appropriate data compression in a network communication.

  • PDF

Value Complexity of Virtual Communities and Information Security in the Postmodern World: Semantic Focus and Language Innovations

  • Khrypko, Svitlana;ALEKSANDROVA, Olena;Stoliarchuk, lesia;Ishchuk, Olena;OBLOVA, Liudmyla;Pavlovska, Olena;Andrii, Bezuhlyi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.712-718
    • /
    • 2021
  • Virtual communities are studied to analyze their characteristic features, types, and tole to modern society. The article is aimed at creating a classification of virtual communities according to specific characteristics, which can be used to model the interaction, and necessity of components that are important for the community. The classification of virtual communities will contribute to their better performance and satisfy the users' needs in information. The study reveals the value structure of virtual communities, educational and communicative influence, and the possible threats these communities may bring to society and security.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Dynamic data Path Prediction in Network Virtual Environment

  • Jeoung, You-Sun;Ra, Sang-Dong
    • Journal of information and communication convergence engineering
    • /
    • 제5권2호
    • /
    • pp.83-87
    • /
    • 2007
  • This research studies real time interaction and dynamic data shared through 3D scenes in virtual network environments. In a distributed virtual environment of client-server structure, consistency is maintained by the static information exchange; as jerks occur by packet delay when updating messages of dynamic data exchanges are broadcasted disorderly, the network bottleneck is reduced by predicting the movement path by using the Dead-reckoning algorithm. In Dead-reckoning path prediction, the error between the estimated and the actual static values which is over the threshold based on the shared object location requires interpolation and multicasting of the previous location by the ESPDU of DIS. The shared dynamic data of the 3D virtual environment is implementation using the VRML.

모바일 장치를 위한 iSCSI 프로토콜 기반의 가상 USB 드라이브 설계 및 구현 (Design and Implementation of iSCSI Protocol Based Virtual USB Drive for Mobile Devices)

  • 최재현;남영진;김종완
    • 대한임베디드공학회논문지
    • /
    • 제5권4호
    • /
    • pp.175-184
    • /
    • 2010
  • This paper designs a virtual USB drive for mobile devices which gives an illusion of a traditional USB flash memory drive and provides capacity-free storage space over IP network. The virtual USB drive operating with a S3C2410 hardware platform and embedded linux consists of USB device driver, an iSCSI-enabled network stack, and a seamless USB/iSCSI tunneling module. For performance enhancement, it additionally provides a kernel-level seamless USB/iSCSI tunneling module and data sharing with symbol references among kernel modules. Experiments reveal that the kernel-level implementation can improve the I/O performance up to 8 percentage, as compared with the user-level implementation.

Implementation of an Autostereoscopic Virtual 3D Button in Non-contact Manner Using Simple Deep Learning Network

  • You, Sang-Hee;Hwang, Min;Kim, Ki-Hoon;Cho, Chang-Suk
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.505-517
    • /
    • 2021
  • This research presented an implementation of autostereoscopic virtual three-dimensional (3D) button device as non-contact style. The proposed device has several characteristics about visible feature, non-contact use and artificial intelligence (AI) engine. The device was designed to be contactless to prevent virus contamination and consists of 3D buttons in a virtual stereoscopic view. To specify the button pressed virtually by fingertip pointing, a simple deep learning network having two stages without convolution filters was designed. As confirmed in the experiment, if the input data composition is clearly designed, the deep learning network does not need to be configured so complexly. As the results of testing and evaluation by the certification institute, the proposed button device shows high reliability and stability.

클라우드 VR 기반 다중 사용자 메타버스 콘텐츠를 위한 엣지 컴퓨팅 서버 배치 기법 (Edge Computing Server Deployment Technique for Cloud VR-based Multi-User Metaverse Content)

  • 김원석
    • 한국멀티미디어학회논문지
    • /
    • 제24권8호
    • /
    • pp.1090-1100
    • /
    • 2021
  • Recently, as indoor activities increase due to the spread of infectious diseases, the metaverse is attracting attention. Metaverse refers to content in which the virtual world and the real world are closely related, and its representative platform technology is VR(Virtual Reality). However, since VR hardware is difficult to access in terms of cost, the concept of streaming-based cloud VR has emerged. This study proposes a server configuration and deployment method in an edge network when metaverse content involving multiple users operates based on cloud VR. The proposed algorithm deploys the edge server in consideration of the network and computing resources and client location for cloud VR, which requires a high level of computing resources while at the same time is very sensitive to latency. Based on simulation, it is confirmed that the proposed algorithm can effectively reduce the total network traffic load regardless of the number of applications or the number of users through comparison with the existing deployment method.

A Segmentation Guided Coarse to Fine Virtual Try-on Network for a new Clothing and Pose

  • Sandagdorj, Dashdorj;Tuan, Thai Thanh;Ahn, Heejune
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송∙미디어공학회 2020년도 추계학술대회
    • /
    • pp.33-36
    • /
    • 2020
  • Virtual try on is getting interested from researchers these days because its application in online shopping. But single pose virtual try on is not enough, customer may want to see themselves in different pose. Multiple pose virtual try on is getting input as customer image, an in-shop cloth and a target pose, it will try to generate realistic customer wearing the in-shop cloth with the target pose. We first generate the target segmentation layout using conditional generative network (cGAN), and then the in-shop cloth are warped to fit the customer body in target pose. Finally, all the result will be combine using a Resnet-like network. We experiment and show that our method outperforms stage of the art.

  • PDF

VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법 (Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment)

  • 김광준;황규호;김인경;오형근;이만희
    • 정보보호학회논문지
    • /
    • 제28권2호
    • /
    • pp.449-456
    • /
    • 2018
  • 불필요한 트래픽의 송수신을 통한 분리된 조직/부서 간의 내부 자료 유출을 방지하기 위해 많은 조직에서 네트워크를 분할하여 망을 관리한다. 물리적으로 별도의 장비를 기반으로 하는 것이 가장 근본적인 네트워크 분할 방식이나 이보다 적은 비용으로 구축이 가능한 가상랜(Virtual LAN, VLAN) 네트워크 접근 제어 기능을 활용하여 논리적으로 네트워크를 분할 운영하는 사례가 존재한다. 본 연구에서는 VLAN ID값을 검색하는 스캐닝 기법과 Double Encapsulation VLAN Hopping 공격기법을 활용해 VLAN을 이용하여 분할된 네트워크 간 통신 우회 가능성을 제시한 후, 스캐닝을 통해 획득한 VLAN ID 정보를 이용한 자료 유출 시나리오를 제시한다. 또한 이 공격을 탐지 및 차단하기 위한 기법을 제안하고 구현을 통해 제시된 기법의 효과에 대해 검증한다. 본 연구는 궁극적으로 VLAN으로 분리된 네트워크 취약점을 활용한 자료 유출 또는 외부 사이버 공격을 차단함으로써 VLAN 이용 환경의 보안성 향상에 기여할 것으로 기대한다.

전자상거래 시스템의 트래픽량 예측에 관한 연구 (A Study on Traffic Volume Prediction for e-Commerce Systems)

  • 김정수
    • 정보처리학회논문지C
    • /
    • 제18C권1호
    • /
    • pp.31-44
    • /
    • 2011
  • 네트워크 기반의 적절한 컴퓨팅은 네트워크 대역폭의 가용성에 의존한다. 백본 네트워크 용량과 액세스 네트워크 상에 심각한 버틀넥이 발생하여 ISP 사업자와 고객 간의 갭이 발생된다면 그만큼 ISP 사업자는 사업에 불이익을 초래할 수 있다. 이러한 상황이 발생되기 이전 ISP 사업자가 트래픽량 예측과 종단간 오버로드가 높은 링크 구간을 감지할 수 있다면 ISP 사업자와 고객 간의 갭은 그만큼 줄어 들 수 있을 것으로 판단된다. 따라서 본 논문은 트래픽량 예측과 종단간 오버로드가 높은 링크 구간을 감지 가능한 소프트웨어로 ACE, ADM, Flow Analysis를 소개한다. 이들 툴을 이용하여 전자상거래의 연속적인 트랜잭션을 실망에서 측정한 후 측정된 네트워크 데이터를 가상 망 환경에 임포트하고 백그라운드 트래픽을 생성한다. 이와 같은 가상 망 환경을 토대로 점차적인 사용자 수 증가에 따른 트래픽량 예측과 링크 로드가 높은 구간을 시뮬레이션 결과로 알 수 있었다.