With the application of virtual reality technology to realize interactive display of virtual museum as content of study,we analyze the problems in the current virtual museum system.Taking Daqing Museum for example,we ...With the application of virtual reality technology to realize interactive display of virtual museum as content of study,we analyze the problems in the current virtual museum system.Taking Daqing Museum for example,we develop a 2.5D(between 2D and 3D) architectural modeling technology,and combine it with virtual reality technology,to create the virtual museum simulation platform.By establishing the virtual simulation platform of Daqing Museum,we verify the feasibility of using 2.5D architectural modeling technology to build the virtual museum system,create a virtual simulation platform with practical value,and show the bright future of virtual museum based on 2.5D virtual reality technology.展开更多
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who...It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.展开更多
A method of 3 D kinematics simulation of robot fighting platform (RFP) in virtual environment is proposed with the aim of enhancing vision telepresence. Based on the theory of space coordinate transformation, kinema...A method of 3 D kinematics simulation of robot fighting platform (RFP) in virtual environment is proposed with the aim of enhancing vision telepresence. Based on the theory of space coordinate transformation, kinematics equat!ons of RFP are formulated; followed by applying a method of modeling using 3DMAX software to build an RFP's 3D geometric model before a 3D kinematics simulation system of RFP is completed based on virtual reality technology and Open Inventor VC + +. Test results have indicated that this system can perform RFP's kinematics simulation in virtual environment. It can also imitate RFP's motion states and environmental features well. Moreover, not only can better real-time performances and interactions be achieved but also operator's vision telepresence be enhanced, therefore this approach may help lay the foundation for the realization of RFP's teleoperation with vision telepresence.展开更多
Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physica...Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system(CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate(assist each other) to perform a real-world task(search for a hidden object)for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS.The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS.展开更多
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical fra...This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.展开更多
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper...Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.展开更多
文摘With the application of virtual reality technology to realize interactive display of virtual museum as content of study,we analyze the problems in the current virtual museum system.Taking Daqing Museum for example,we develop a 2.5D(between 2D and 3D) architectural modeling technology,and combine it with virtual reality technology,to create the virtual museum simulation platform.By establishing the virtual simulation platform of Daqing Museum,we verify the feasibility of using 2.5D architectural modeling technology to build the virtual museum system,create a virtual simulation platform with practical value,and show the bright future of virtual museum based on 2.5D virtual reality technology.
基金the National High Technology Research and Development Program of China (2007AA01Z412)
文摘It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.
基金Sponsored by Independent Research Projects of State Key Laboratory (ZDKT08-05)
文摘A method of 3 D kinematics simulation of robot fighting platform (RFP) in virtual environment is proposed with the aim of enhancing vision telepresence. Based on the theory of space coordinate transformation, kinematics equat!ons of RFP are formulated; followed by applying a method of modeling using 3DMAX software to build an RFP's 3D geometric model before a 3D kinematics simulation system of RFP is completed based on virtual reality technology and Open Inventor VC + +. Test results have indicated that this system can perform RFP's kinematics simulation in virtual environment. It can also imitate RFP's motion states and environmental features well. Moreover, not only can better real-time performances and interactions be achieved but also operator's vision telepresence be enhanced, therefore this approach may help lay the foundation for the realization of RFP's teleoperation with vision telepresence.
文摘Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system(CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate(assist each other) to perform a real-world task(search for a hidden object)for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS.The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS.
文摘This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.
文摘Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.