Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam...Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest.展开更多
Network coding has been considered as one of the effective strategies that improve the throughput of multi- hop wireless networks. In order to effectively apply network coding techniques to the real multi-hop wireless...Network coding has been considered as one of the effective strategies that improve the throughput of multi- hop wireless networks. In order to effectively apply network coding techniques to the real multi-hop wireless networks, a practical network coding aware routing protocol is proposed in this paper, for unicast sessions in multi- hop wireless networks. The protocol is based on a novel routing metric design that captures the characteristics of network coding and unicast sessions. To ensure the novel routing mettle can operate with practical and widely available path calculation algorithms, a unique mapping process is used to map a real wireless network to a virtual network. The mapping process ensures that the paths with the biggest coding opportunities will be selected by commonly used path calculation algorithms. Simulation results show that the proposed routing protocol is effective to improve the network throughput.展开更多
Providing services on demand is a major contributing factor to drive the increasingly development of the software defined network. However, it should supply all the current popular applications before it really attain...Providing services on demand is a major contributing factor to drive the increasingly development of the software defined network. However, it should supply all the current popular applications before it really attains widespread development. Multiple Description Coding(MDC) video applications, as a popular application in the current network, should be reasonably supported in this novel network virtualization environment. In this paper, we address this issue to assign MDC video application into virtual networks with an efficient centralized algorithm(CAMDV). Since this problem is an NP-hard problem, we design an algorithm that can effectively balance the user satisfaction and network resource cost. Previous work just builds a global multicast tree for each description to connect all the destination nodes by breadth-first search strategy or shortest path tree algorithm. But those methods could not achieve an optimal balance or a high-level user satisfaction. By introducing the hierarchical clustering scheme, our algorithm decomposes the whole mapping procedure into multicast tree construction and multipath description distribution. A serial of simulation experiments show that our centralized algorithm could achieve a better performance in balancing the user satisfaction and average mapping cost in comparison with its rivals.展开更多
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c...The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective.展开更多
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers.The proposed Virtual Cloud Storag...The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers.The proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as availability.To provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks.Hashing the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage.Thefile could be retrieved by performing the opera-tions in reverse.Using the regenerating code,the model could regenerate the missing and corrupted chunks from the cloud.The proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage capacity.Experimental results analysis show that the proposed model has been tested with storage space and response time for storage and retrieval.The VCSA model consumes 1.5x(150%)storage space.It was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA model.The response time VCSA model was tested with different sizedfiles starting from 2 to 16 MB.The response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.展开更多
This is an attempt to explain mRNA-dependent non-stationary semantic values of codons (triplets) and nucleotides (letters) in codon composition during protein biosynthesis. This explanation is realized by comparing th...This is an attempt to explain mRNA-dependent non-stationary semantic values of codons (triplets) and nucleotides (letters) in codon composition during protein biosynthesis. This explanation is realized by comparing the different protein codes of various biosystem taxa, and, comparing mitochondrial code with the standard code. An initial mRNA transcriptional virtuality (Virtual-Reality) is transformed into material reality at the level of translation of virtual triplets into real (material) amino acids or into a real stop command of protein biosynthesis. The transformation of virtuality into reality occurs de facto when the linguistic sign1 functions of the codon syhoms are realized in the 3’ nucleotide (wobbling nucleotide according to F. Crick) in the process of protein biosynthesis. This corresponds to the theoretical works of the authors of this article. Despite the illusory appearance of semantic arbitrariness during the operation of ribosomes in the mode of codon semantic non-stationarity, this phenomenon probably provides biosystems with an unusually high level of adaptability to changes in the external environment as well as to internal (mental) dynamics of neuron’s genome in the cerebral cortex. The genome’s non-stationarity properties at the nucleotide, codon, gene and mental levels have fractal structure and corresponding dimensions. The highest form of such fractality (with maximum dimension) is probably realized in the genomic continuum of neurons in the human cerebral cortex through this semantic Virtual-to-Real (VR) codon transcoding with the biosynthesis of short-living semantic proteins, as the equivalents of material thinking-consciousness. In fact, this is the language of the brain’s genome, that is, our own language. In this case, the same thing happens in natural, primarily mental (non-verbal) languages. Their materialization is recorded in vocables (sounding words) and in writing. Such writing is the amino acid sequence in the semantic proteins of the human cerebral cortex. Rapidly decaying, such proteins can leave a long-lasting “so-called” Schrödinger wave holographic memory in the cerebral cortex. The presented below study is purely theoretical and based on a logical approach. The topic of the study is very complex and is subject to further development.展开更多
在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-I...在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。展开更多
文摘Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest.
基金Supported by the National Natural Science Foundation of China (No. 60903156), and the National Science and Technology Major Project of the Ministry of Science and Technology of China (No. 2010ZX03004-001-02).
文摘Network coding has been considered as one of the effective strategies that improve the throughput of multi- hop wireless networks. In order to effectively apply network coding techniques to the real multi-hop wireless networks, a practical network coding aware routing protocol is proposed in this paper, for unicast sessions in multi- hop wireless networks. The protocol is based on a novel routing metric design that captures the characteristics of network coding and unicast sessions. To ensure the novel routing mettle can operate with practical and widely available path calculation algorithms, a unique mapping process is used to map a real wireless network to a virtual network. The mapping process ensures that the paths with the biggest coding opportunities will be selected by commonly used path calculation algorithms. Simulation results show that the proposed routing protocol is effective to improve the network throughput.
基金supported by the National Basic Research Program of China (2012CB315903)the National Science and Technology Support Program (2014BAH24F01)+3 种基金the Program for Key Science and Technology Innovation Team of Zhejiang Province (2011R50010-21, 2013TD20)863 Program of China (2015AA016103)the National Natural Science Foundation of China (61379118)the Fundamental Research Funds for the Central Universities
文摘Providing services on demand is a major contributing factor to drive the increasingly development of the software defined network. However, it should supply all the current popular applications before it really attains widespread development. Multiple Description Coding(MDC) video applications, as a popular application in the current network, should be reasonably supported in this novel network virtualization environment. In this paper, we address this issue to assign MDC video application into virtual networks with an efficient centralized algorithm(CAMDV). Since this problem is an NP-hard problem, we design an algorithm that can effectively balance the user satisfaction and network resource cost. Previous work just builds a global multicast tree for each description to connect all the destination nodes by breadth-first search strategy or shortest path tree algorithm. But those methods could not achieve an optimal balance or a high-level user satisfaction. By introducing the hierarchical clustering scheme, our algorithm decomposes the whole mapping procedure into multicast tree construction and multipath description distribution. A serial of simulation experiments show that our centralized algorithm could achieve a better performance in balancing the user satisfaction and average mapping cost in comparison with its rivals.
基金Project supported by High-Technology Research and Develop-ment Program of China (Grant No .863 -2003AA404210)
文摘The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective.
文摘The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers.The proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as availability.To provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks.Hashing the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage.Thefile could be retrieved by performing the opera-tions in reverse.Using the regenerating code,the model could regenerate the missing and corrupted chunks from the cloud.The proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage capacity.Experimental results analysis show that the proposed model has been tested with storage space and response time for storage and retrieval.The VCSA model consumes 1.5x(150%)storage space.It was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA model.The response time VCSA model was tested with different sizedfiles starting from 2 to 16 MB.The response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.
文摘This is an attempt to explain mRNA-dependent non-stationary semantic values of codons (triplets) and nucleotides (letters) in codon composition during protein biosynthesis. This explanation is realized by comparing the different protein codes of various biosystem taxa, and, comparing mitochondrial code with the standard code. An initial mRNA transcriptional virtuality (Virtual-Reality) is transformed into material reality at the level of translation of virtual triplets into real (material) amino acids or into a real stop command of protein biosynthesis. The transformation of virtuality into reality occurs de facto when the linguistic sign1 functions of the codon syhoms are realized in the 3’ nucleotide (wobbling nucleotide according to F. Crick) in the process of protein biosynthesis. This corresponds to the theoretical works of the authors of this article. Despite the illusory appearance of semantic arbitrariness during the operation of ribosomes in the mode of codon semantic non-stationarity, this phenomenon probably provides biosystems with an unusually high level of adaptability to changes in the external environment as well as to internal (mental) dynamics of neuron’s genome in the cerebral cortex. The genome’s non-stationarity properties at the nucleotide, codon, gene and mental levels have fractal structure and corresponding dimensions. The highest form of such fractality (with maximum dimension) is probably realized in the genomic continuum of neurons in the human cerebral cortex through this semantic Virtual-to-Real (VR) codon transcoding with the biosynthesis of short-living semantic proteins, as the equivalents of material thinking-consciousness. In fact, this is the language of the brain’s genome, that is, our own language. In this case, the same thing happens in natural, primarily mental (non-verbal) languages. Their materialization is recorded in vocables (sounding words) and in writing. Such writing is the amino acid sequence in the semantic proteins of the human cerebral cortex. Rapidly decaying, such proteins can leave a long-lasting “so-called” Schrödinger wave holographic memory in the cerebral cortex. The presented below study is purely theoretical and based on a logical approach. The topic of the study is very complex and is subject to further development.
文摘在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。