scholarly journals ALVIC versus the Internet: Redesigning a Networked Virtual Environment Architecture

2008 ◽  
Vol 2008 ◽  
pp. 1-9 ◽  
Author(s):  
Peter Quax ◽  
Jeroen Dierckx ◽  
Bart Cornelissen ◽  
Wim Lamotte

The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. However, from a research point of view, the inherent weaknesses in their architectures are quickly exposed. The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet. While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in the near future. It is, therefore, that we have recently started with the development of ALVIC-NG, which, while incorporating the findings from our previous research, makes several improvements on the original version, making it suitable for deployment on the Internet as it exists today.

2012 ◽  
Vol 21 (4) ◽  
pp. 452-469 ◽  
Author(s):  
Jun Lee ◽  
Mingyu Lim ◽  
HyungSeok Kim ◽  
Jee‐In Kim

A concurrency control mechanism for a networked virtual environment is a key element in many collaborative computer-aided design applications. However, conventional object-based locking mechanisms restrict the behaviors of nonowners, and an attribute-based locking mechanism may produce another problem called task-surprise, which disturbs users' collaboration. In this paper, we propose a hybrid concurrency control mechanism that reduces restrictions of nonowners' behaviors and task-surprises in a networked virtual environment. The proposed method consists of two concurrency control approaches: task-based concurrency control and personal workspaces. The task-based concurrency control approach allows nonowners to do some tasks if they do not conflict with the tasks of the owner of the shared object. The personal workspaces approach provides an independent workspace where a user can manipulate copies of the shared objects. The proposed method was applied to a collaborative level design for a large-scale online game as a case study. We evaluated its performance by experiments and user studies to check acceptance and usability of the proposed method.


2018 ◽  
Vol 19 (6) ◽  
pp. 110-114
Author(s):  
Jarosław Jabłonka

The assumption that each road participant adheres to the rules, ideally adapts his behavior to the prevailing road conditions, is unrealistic, and as the basis for taking action can lead to collisions and accidents. The article presents the theoretical models allowing to understand the behavior of drivers who deliberately enforce the priority of passing, and their only motivation is the shortest travel time through the intersection. Two types of situations at crossroads are considered: with guided and non-guided traffic with the STOP sign. The presented mathematical models are illustrated by the real-life recordings of drivers available on the Internet.


2015 ◽  
Vol 10 (2) ◽  
pp. 76
Author(s):  
Gheorghe-Andrei Dan ◽  
Adrian Catalin Buzea ◽  
◽  

Non-antivitamin K oral anticoagulants (NOACs) have recently emerged as a new class of antithrombotic drugs. Four large-scale, randomised controlled trials (RCT) accredited dabigatran, rivaroxaban and edoxaban with evident advantages for stroke prevention in atrial fibrillation (AF) compared with warfarin. The superiority concerns not only the manageability but also the antithrombotic efficacy and safety. Aspects of real-life clinical experience with NOAC for stroke prevention in AF are analysed in an attempt to underline some practical differences. If at present the individualisation of the NOAC class drugs is still a subject of debate it is probable that in the near future we will be able to adapt the drug and dosages to individual patient’s profile.


Author(s):  
A.G. Abdrakhmanova ◽  
◽  
S.E. Tapanova ◽  
M. Toplu ◽  
◽  
...  

Now is the time when everything is developing rapidly. Many things have been transformed within a short period of time. With the development of technology, people also began to change. A person who spends a lot of time on the Internet loses, first, itself. Mental health and attitude of the person to the surrounding world are changing too. The worst thing is that the person becomes addicted to the Internet, goes away from real life, and completely immerses himself in the world of the Internet. Therefore, we must not allow Internet addiction. Otherwise, we are risking shortening our already short life and turn it into meaningless existence. Television, the Internet, and social networks have been in the process of integration, that is, at the stage of involvement, for almost 15 years. The way of using them is for everyone’s personal matter; someone may correctly use Internet resources; others may abuse them. The Internet should be considered as a source of information, not as a competitor. The matter is that journalism is always in need of innovation. Kazakh ancestors said: Keep up with the times, that is, do not stay behind. So that, journalism should move with the times, taking a place on the front line. Only those media organizations that unite both sides may be a few steps ahead.


2009 ◽  
pp. 1147-1156
Author(s):  
Lynne D. Roberts ◽  
Leigh M. Smith ◽  
Clare M. Pollock

Once connected to the Internet, there is a myriad of virtual communities that an individual can connect to, interact within and become a member of. However, little is known about the processes individuals employ in identifying, selecting, and interacting within these virtual communities. How does an individual decide which type of virtual environment they will use? What are the stages that individuals go through in their use of virtual communities? Do the stages of use vary across types of virtual communities? In this article, we examine these questions, focusing on stages of use of individual virtual communities within the larger context of patterns of Internet use over time. First, we examine predictors of the type of virtual environments that an individual might use, highlighting the impact of demographic factors, personality, history, and location of Internet use. Then we draw on our own research to examine stages of use of two types of synchronous text-based virtual environments. Finally, we develop a generic model of stages of use of virtual environments.


Author(s):  
Susan A. Baim

Local, state and federal governments face a continuing need to supply increased amounts of information to their constituencies. Requests for information involve routine matters such as filing for a building permit, checking a property’s legal description, or looking up employment statistics. Requests for information can also involve more complex matters such as seeking advice on how to file income taxes, how to apply for government-sponsored loan programs and/or jobs, or ways to lobby lawmakers to advance a political point of view. In many cases, individuals are now looking to their governments to interact with them electronically, with the same level of sophistication, accuracy, and timeliness that they are experiencing from other online organizations. As a result, there is a tremendous incentive for governmental agencies to understand the Internet-based needs and wants of their constituencies and to respond to them accordingly. The use of efficient and effective virtual communities and interactive Web sites can assist in this process.


2021 ◽  
Author(s):  
Marcos Allende López ◽  
Diego López ◽  
Sergio Cerón ◽  
Antonio Leal ◽  
Adrián Pareja ◽  
...  

This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.


2019 ◽  
Vol 24 (3) ◽  
pp. 242-249
Author(s):  
Vasile Florin Popescu

Abstract Digitization of the human body, philosophically said, - the “mating” with technology, represents the fusion of electronic technology with the human biology, which reduces the barriers of physical, digital and biological life. “The Internet of bodies”, that is the imminent development of the field of digitization of the human body on a large scale, is the inevitable future of technology at this moment. Instead of devices connected to the Internet as in Internet of Things (IoT), human bodies can be connected to a network, with the potential to be controlled and monitored remotely. The Internet of bodies is from the author’s point of view the future of technology, but this future is not so far away.


Sign in / Sign up

Export Citation Format

Share Document