• Title/Summary/Keyword: virtual computing systems

Search Result 211, Processing Time 0.03 seconds

Development of Multi-platform 3D Interactive Rural Landscape Simulator with Low-cost Web GIS and Game Engine (무료 Web GIS와 보급형 게임엔진을 이용한 다중플랫폼 3차원 인터랙티브 농촌경관 시뮬레이터 개발)

  • Lee, Sungyong;Kim, Taegon;Lee, Jimin;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.177-189
    • /
    • 2013
  • 3D modeling and rendering technologies are getting more attention from landscape planners and architects because the virtual reality based on 3D graphic technology could give more realistic experience to landscape simulation users and boost promotional effects. The 3D landscape simulation, however, not only requires a lot of cost and time in production, but also demands efforts to distribute to consumers due to various computing environment of them. The purpose of this study is to suggest a process for developing an interactive 3D landscape simulator with low-cost, which can support multi-platform functionality in high quality through reviewing related current software and web services. We select GIMP for 2D image texturing, SketchUpfor 3D modeling, Unity for real-time rendering, and Google Earth for terrain modeling considering price and workability and apply the developed process for Windows, Web, and Android versions to test the applicability for Sangji-ri, Gosam-myeon, Gyeonggi-do, Korea.

A Study on Hydrologic Analysis and Some Effects of Urbanization on Design Flow of Urban Storm Drainage Systems (1) (도시 하수도망의 수문학적인 평가와 설계확률유량의 점대화 성향에 관한 연구(제1보))

  • 강관원;서병하;윤용남
    • Water for future
    • /
    • v.14 no.4
    • /
    • pp.27-34
    • /
    • 1981
  • The design flow of the urban strom drainage systems has been assessed largely on a basis of empirical relations between rainfall and runoff, and the rational formula has been widely used for the cities in our country. In order to estimate it more accurately, the urban runoff simulation model based on the RRl method has been developed and applied to the sample basin in this study. The rainfall hyetograph of the design stromfor the design flow has been obtained by the determination of the total rainfall and the temporal distributions of that rainfall. The total rainfall has been assessed from the empirical formula of rainfall intensity and the temporal distribution of that rainfall determined on the basis of Huff's method from the historical rainfall data of the basin. The virtual inflow hydrograph to each inlet of the basin has been constructed by computing the series of discharges in each time increment, using design strom hyetograph and time-area diagram. The actual runoff hydrograph at the basin outlet has been computed from the virtual inflow hydrographs by developing a relations between discharge and storage for the watershed. The discharge data for verification of the simulated runoff hydrograph are not available in the sample basin and so the sensitivity analysis of the simulation model has not been possible. The peak discharge for the design of drainage systems has been estimated from the computed runoff hydrograph at the basin outlet and compared to thatl obtained form the rational formula.

  • PDF

A Study of The Wearable Input Device Based on Human Hand-Motions Recognition

  • Daehui Won;Lee, Hogil;Kim, Jinyoung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.51.5-51
    • /
    • 2002
  • In this paper, we propose and developed a keyglove using the touch-typing method as new solutions to the problem of text input into the mobile computing devices. This device recognizes that character is typed in though the hand's movements analysis and requires no additional space on a person's desktop or work surface, and can be easily used with computers of any size, even the smallest mobile computer, and is designed as an input device for wearable computers and virtual environment. The concept of the wearable input device based on human hand-molies recognition.

  • PDF

A Method to Reduce Interference in Sensor Network Location Awareness System (센서 네트워크 기반 위치 인식 시스템 간섭의 최소화 방안에 관한 연구)

  • Lee Hyung-Su;Song Byung-Hun;Ham Kyung-Sun;Youn Hee-Yong
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.31-39
    • /
    • 2006
  • Ubiquitous and pervasive environment presents opportunities for a rich set of location aware applications such as car navigation and intelligent robots, interactive virtual games, logistics service, asset tracking etc. Typical indoor location systems require better accuracy than what current outdoor location systems provide, Outdoor location technologies such as GPS have poor indoor performance because of the harsh nature of indoor environments, In this paper we present a novel reducing interference location system that is particularly well suited to support context aware computing. The system, called EEM (Enhance Envelop Method) alms to combine the advantages of real time tracking systems that implement distributed environment with the suitability of infrastructure sensor network.

  • PDF

Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm

  • Wang, Ning;Lu, Li;Gao, Ge;Wang, Fanglin;Li, Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2420-2433
    • /
    • 2014
  • Fusing the scores of multibiometrics is a very promising approach to improve the overall system's accuracy and the verification performance. In recent years, there are several approaches towards studying score level fusion of several biometric systems. However, most of them does not consider the genuine and imposter score distributions and result in a higher equal error rate usually. In this paper, a novel score level fusion approach of different biometric systems (dual iris, thermal and visible face traits) based on $Acz{\acute{e}}l$-Alsina triangular norm is proposed. It achieves higher identification performance as well as acquires a closer genuine distance and larger imposter distance. The experimental tests are conducted on a virtual multibiometrics database, which merges the challenging CASIA-Iris-Thousand database with noisy samples and the NVIE face database with visible and thermal face images. The rigorous results suggest that significant performance improvement can be achieved after the implementation of multibiometrics. The comparative experiments also ascertain that the proposed fusion approach outperforms the state-of-art verification performance.

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

An Anti-Overload Model for OpenStack Based on an Effective Dynamic Migration

  • Ammar, Al-moalmi;Luo, Juan;Tang, Zhuo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4165-4187
    • /
    • 2016
  • As an emerging technology, cloud computing is a revolution in information technology that attracts significant attention from both public and private sectors. In this paper, we proposed a dynamic approach for live migration to obviate overloaded machines. This approach is applied on OpenStack, which rapidly grows in an open source cloud computing platform. We conducted a cost-aware dynamic live migration for virtual machines (VMs) at an appropriate time to obviate the violation of service level agreement (SLA) before it happens. We conducted a preemptive migration to offload physical machine (PM) before the overload situation depending on the predictive method. We have carried out a distributed model, a predictive method, and a dynamic threshold policy, which are efficient for the scalable environment as cloud computing. Experimental results have indicated that our model succeeded in avoiding the overload at a suitable time. The simulation results from our solution remarked the very efficient reduction of VM migrations and SLA violation, which could help cloud providers to deliver a good quality of service (QoS).

Service Scheduling in Cloud Computing based on Queuing Game Model

  • Lin, Fuhong;Zhou, Xianwei;Huang, Daochao;Song, Wei;Han, Dongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1554-1566
    • /
    • 2014
  • Cloud Computing allows application providers seamlessly scaling their services and enables users scaling their usage according to their needs. In this paper, using queuing game model, we present service scheduling schemes which are used in software as a service (SaaS). The object is maximizing the Cloud Computing platform's (CCP's) payoff via controlling the service requests whether to join or balk, and controlling the value of CCP's admission fee. Firstly, we treat the CCP as one virtual machine (VM) and analyze the optimal queue length with a fixed admission fee distribution. If the position number of a new service request is bigger than the optimal queue length, it balks. Otherwise, it joins in. Under this scheme, the CCP's payoff can be maximized. Secondly, we extend this achievement to the multiple VMs situation. A big difference between single VM and multiple VMs is that the latter one needs to decide which VM the service requests turn to for service. We use a corresponding algorithm solve it. Simulation results demonstrate the good performance of our schemes.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.