Detection of structural changes from an opera- tional process is a major goal in machine condition moni- toring. Existing methods for this purpose are mainly based on retrospective analysis, resulting in a large detec...Detection of structural changes from an opera- tional process is a major goal in machine condition moni- toring. Existing methods for this purpose are mainly based on retrospective analysis, resulting in a large detection delay that limits their usages in real applications. This paper presents a new adaptive real-time change detection algorithm, an extension of the recent research by combin- ing with an incremental sliding-window strategy, to handle the multi-change detection in long-term monitoring of machine operations. In particular, in the framework, Hil- bert space embedding of distribution is used to map the original data into the Re-producing Kernel Hilbert Space (RK_HS) for change detection; then, a new adaptive threshold strategy can be developed when making change decision, in which a global factor (used to control the coarse-to-fine level of detection) is introduced to replace the fixed value of threshold. Through experiments on a range of real testing data which was collected from an experimental rotating machinery system, the excellent detection performances of the algorithm for engineering applications were demonstrated. Compared with state-of- the-art methods, the proposed algorithm can be more suitable for long-term machinery condition monitoring without any manual re-calibration, thus is promising in modern industries.展开更多
Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical devices.Most of the machine learning models are ...Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical devices.Most of the machine learning models are built on the assumption of a static learning environment,but in practical situations,the data generated by the process is dynamic.This evolution of the data is termed concept drift.This research paper presents an approach for predictingmechanical failure in real-time using incremental learning based on the statistically calculated parameters of mechanical equipment.The method proposed here is applicable to allmechanical devices that are susceptible to failure or operational degradation.The proposed method in this paper is equipped with the capacity to detect the drift in data generation and adaptation.The proposed approach evaluates the machine learning and deep learning models for their efficacy in handling the errors related to industrial machines due to their dynamic nature.It is observed that,in the settings without concept drift in the data,methods like SVM and Random Forest performed better compared to deep neural networks.However,this resulted in poor sensitivity for the smallest drift in the machine data reported as a drift.In this perspective,DNN generated the stable drift detection method;it reported an accuracy of 84%and an AUC of 0.87 while detecting only a single drift point,indicating the stability to performbetter in detecting and adapting to new data in the drifting environments under industrial measurement settings.展开更多
Recently, with the rapid growth of information technology, many studies have been performed to implement Web-based manufacturing system. Such technologies are expected to meet the need of many manufacturing industries...Recently, with the rapid growth of information technology, many studies have been performed to implement Web-based manufacturing system. Such technologies are expected to meet the need of many manufacturing industries who want to adopt E-manufacturing system for the construction of globalization, agility, and digitalization to cope with the rapid changing market requirements. In this research, a real-time Web-based machine tool and machining process monitoring system is developed as the first step for implementing E-manufacturing system. In this system, the current variations of the main spindle and feeding motors are measured using hall sensors. And the relationship between the cutting force and the spindle motor RMS (Root Mean Square) current at various spindle rotational speeds is obtained. Thermocouples are used to measure temperature variations of important heat sources of a machine tool. Also, a rule-based expert system is applied in order to decide the machining process and machine tool are in normal conditions. Finally, the effectiveness of the developed system is verified through a series of experiments.展开更多
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM...With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.展开更多
Marine risers play a key role in the deep and ultra-deep water oil and gas production. The vortex-induced vibration (VIV) of marine risers constitutes an important problem in deep water oil exploration and productio...Marine risers play a key role in the deep and ultra-deep water oil and gas production. The vortex-induced vibration (VIV) of marine risers constitutes an important problem in deep water oil exploration and production. VIV will result in high rates of structural failure of marine riser due to fatigue damage accumulation and diminishes the riser fatigue life. In-service monitoring or full scale testing is essential to improve our understanding of V1V response and enhance our ability to predict fatigue damage. One ma- rine riser fatigue acoustic telemetry scheme is proposed and an engineering prototype machine has been developed to monitor deep and ultra-deep water risers' fatigue and failure that can diminish the riser fatigue life and lead to economic losses and eco-catastrophe. Many breakthroughs and innovation have been achieved in the process of developing an engineering prototype machine. Sea trials were done on the 6th generation deep-water drilling platform HYSY-981 in the South China Sea. The inclination monitoring results show that the marine riser fatigue acoustic telemetry scheme is feasible and reliable and the engineering prototype machine meets the design criterion and can match the requirements of deep and ultra-deep water riser fatigue monitoring. The rich experience and field data gained in the sea trial which provide much technical support for optimization in the engineering prototype machine in the future.展开更多
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the...Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions.展开更多
Electrical machines are precarious mechanisms in manufacturing practices. A motor failure may yield an unexpected interruption at the industrial plant, with consequences in costs, product quality, and security. To gov...Electrical machines are precarious mechanisms in manufacturing practices. A motor failure may yield an unexpected interruption at the industrial plant, with consequences in costs, product quality, and security. To govern the conditions of each part of motor, various testing and monitoring methods have been developed. In this paper, a review on effective fault indicators and vibration based condition monitoring approaches of rotating electrical machines has been accomplished. The determination of the review is to progress the understanding of vibration based analysis, and its use in the Machine Health Monitoring. A variety of analysis was identified to highlight the concept of predictive maintenance in industries. The techniques of vibration analysis were investigated to detect both healthy and fault related signals of rotating machineries.展开更多
During the oil production, in order to monitor the working conditions of an electrical submersible pump (ESP),an electrical current recorder is used to monitor the electric motor current of an ESP. The recorder char...During the oil production, in order to monitor the working conditions of an electrical submersible pump (ESP),an electrical current recorder is used to monitor the electric motor current of an ESP. The recorder charts indicate various working conditions of the ESP. Subtle malfunctions or abnormal problems of the ESP can be detected and further analyzed from various features of these current curves on the recording charts. Presently, these current charts are manually read and analyzed in oil fields. In this paper, a diagnosis expert system is presented for automatically analyzing these current recording charts and identifying the working condition of the ESP. This expert system includes an open knowledge base, which can be updated or enriched according to the identified features of the current curves on the recording charts, and a condition monitoring and failure pattern recognition method, which is called "pick-up method of feature of the recording chart", and can be correctly applied in most cases. It has been shown that this expert system can effectively improve the accuracy and efficiency of failure diagnosis and working condition monitoring of ESPs.展开更多
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and...Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss.展开更多
With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the vip operating system runs on the virtual machine monitor as non-privileged mode. The...With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the vip operating system runs on the virtual machine monitor as non-privileged mode. The redirecting and monitoring modules are added into the virtual machine monitor. When a vip application is calling a system call, it is trapped and redirected from the least privileged level into the virtual machine monitor running in the most privileged level. After logging is finished. it returns to the vip operating system running in the more privileged level and starts the system call. Compared with the traditional methods for logging system activities, the novel method makes it more difficult to destroy or tamper the logs. The preliminary evaluation shows that the prototype is simple and efficient.展开更多
This paper analyses the error sources in neural network prediction. The relationship between prediction error and quality of training sets is revealed. The influence of quality of training sets on the performance of a...This paper analyses the error sources in neural network prediction. The relationship between prediction error and quality of training sets is revealed. The influence of quality of training sets on the performance of an artificial neural network(ANN) applied in time series prediction is discussed. A numerical criterion called degree of consistency(DCT) defined from the statistical point of view for evaluating quality of training sets is introduced. Some simulation results and corresponding suggestions are presented along with the new criterion in order to properly select the training sets for neural network training.展开更多
Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the...Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the interface be- tween OS and VMM complex. This results in a code base that is very hard to verify the security of the VMM. For exam- ple, a misuse of a VMM hyper-call by a malicious vip OS can corrupt the whole VMM. The complexity of the VMM also makes it hard to formally verify the correctness of the system's behavior. In this paper a new VMM, operating sys- tem virtualization (OSV), is proposed. The multiprocessor boot interface and memory configuration interface are virtu- alized in OSV at boot time in the Linux kernel. After booting, only inter-processor interrupt operations are intercepted by OSV, which makes the interface between OSV and OS sim- ple. The interface is verified using formal model checking, which ensures a malicious OS cannot attack OSV through the interface. Currently, OSV is implemented based on the AMD Opteron multi-core server architecture. Evaluation re- sults show that Linux running on OSV has a similar perfor- mance to native Linux. OSV has a performance improvement of 4%-13% over Xen.展开更多
The condition of the road infrastructure has severe impacts on the road safety, driving comfort, and on the rolling resistance. Therefore, the road infrastructure must be moni- tored comprehensively and in regular int...The condition of the road infrastructure has severe impacts on the road safety, driving comfort, and on the rolling resistance. Therefore, the road infrastructure must be moni- tored comprehensively and in regular intervals to identify damaged road segments and road hazards. Methods have been developed to comprehensively and automatically digitize the road infrastructure and estimate the road quality, which are based on vehicle sensors and a supervised machine learning classification. Since different types of vehicles have various suspension systems with different response functions, one classifier cannot be taken over to other vehicles. Usually, a high amount of time is needed to acquire training data for each individual vehicle and classifier. To address this problem, the methods to collect training data automatically for new vehicles based on the comparison of trajectories of untrained and trained vehicles have been developed. The results show that the method based on a k-dimensional tree and Euclidean distance performs best and is robust in transferring the information of the road surface from one vehicle to another. Furthermore, this method offers the possibility to merge the output and road infrastructure information from multiple vehicles to enable a more robust and precise prediction of the ground truth.展开更多
Static cache partitioning can reduce inter- application cache interference and improve the composite performance of a cache-polluted application and a cache- sensitive application when they run on cores that share the...Static cache partitioning can reduce inter- application cache interference and improve the composite performance of a cache-polluted application and a cache- sensitive application when they run on cores that share the last level cache in the same multi-core processor. In a virtu- alized system, since different applications might run on dif- ferent virtual machines (VMs) in different time, it is inappli- cable to partition the cache statically in advance. This paper proposes a dynamic cache partitioning scheme that makes use of hot page detection and page migration to improve the com- posite performance of co-hosted virtual machines dynami- cally according to prior knowledge of cache-sensitive appli- cations. Experimental results show that the overhead of our page migration scheme is low, while in most cases, the com- posite performance is an improvement over free composition.展开更多
The increasing requirements of intensive interoperaterbility among the distributed nodes desiderate the high performance network connections, owing to the substantial growth of cloud computing and datacenters. Network...The increasing requirements of intensive interoperaterbility among the distributed nodes desiderate the high performance network connections, owing to the substantial growth of cloud computing and datacenters. Network I/O virtualization aggregates the network resource and separates it into manageable parts for particular servers or devices, which provides effective consolidation and elastic management with high agility, flexibility and scalability as well as reduced cost and cabling. However, both network I/O virtualization aggregation and the increasing network speed incur higher traffic density, which generates a heavy system stress for I/O data moving and I/O event processing. Consequently, many researchers have dedicated to enhancing the system performance and alleviating the system overhead for high performance networking virtualizatiou. This paper first elaborates the mainstreaming I/O virtualization methodologies, including device emulation, split-driver model and hardware assisted model. Then, the paper discusses and compares their specific advantages in addition to performance bottlenecks in practical utilities. This paper mainly focuses on the comprehensive survey of state- of-the-art approaches for performance optimizations and improvements as well as the portability management for network I/O virtualization. The approaches include various novel data delivery schemes, overhead mitigations for interrupt processing and adequate resource allocations for dynamic network states. Finally, we highlight the diversity of I/O virtualization besides the performance improvements in network virtualization infrastructure.展开更多
基金Supported by National Natural Science Foundation of China(Grant Nos.61403232,61327003)Shandong Provincial Natural Science Foundation of China(Grant No.ZR2014FQ025)Young Scholars Program of Shandong University,China(YSPSDU,2015WLJH30)
文摘Detection of structural changes from an opera- tional process is a major goal in machine condition moni- toring. Existing methods for this purpose are mainly based on retrospective analysis, resulting in a large detection delay that limits their usages in real applications. This paper presents a new adaptive real-time change detection algorithm, an extension of the recent research by combin- ing with an incremental sliding-window strategy, to handle the multi-change detection in long-term monitoring of machine operations. In particular, in the framework, Hil- bert space embedding of distribution is used to map the original data into the Re-producing Kernel Hilbert Space (RK_HS) for change detection; then, a new adaptive threshold strategy can be developed when making change decision, in which a global factor (used to control the coarse-to-fine level of detection) is introduced to replace the fixed value of threshold. Through experiments on a range of real testing data which was collected from an experimental rotating machinery system, the excellent detection performances of the algorithm for engineering applications were demonstrated. Compared with state-of- the-art methods, the proposed algorithm can be more suitable for long-term machinery condition monitoring without any manual re-calibration, thus is promising in modern industries.
文摘Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical devices.Most of the machine learning models are built on the assumption of a static learning environment,but in practical situations,the data generated by the process is dynamic.This evolution of the data is termed concept drift.This research paper presents an approach for predictingmechanical failure in real-time using incremental learning based on the statistically calculated parameters of mechanical equipment.The method proposed here is applicable to allmechanical devices that are susceptible to failure or operational degradation.The proposed method in this paper is equipped with the capacity to detect the drift in data generation and adaptation.The proposed approach evaluates the machine learning and deep learning models for their efficacy in handling the errors related to industrial machines due to their dynamic nature.It is observed that,in the settings without concept drift in the data,methods like SVM and Random Forest performed better compared to deep neural networks.However,this resulted in poor sensitivity for the smallest drift in the machine data reported as a drift.In this perspective,DNN generated the stable drift detection method;it reported an accuracy of 84%and an AUC of 0.87 while detecting only a single drift point,indicating the stability to performbetter in detecting and adapting to new data in the drifting environments under industrial measurement settings.
基金Project (No. KRF-2005-202-D00046) supported by the Korea Re-search Foundation
文摘Recently, with the rapid growth of information technology, many studies have been performed to implement Web-based manufacturing system. Such technologies are expected to meet the need of many manufacturing industries who want to adopt E-manufacturing system for the construction of globalization, agility, and digitalization to cope with the rapid changing market requirements. In this research, a real-time Web-based machine tool and machining process monitoring system is developed as the first step for implementing E-manufacturing system. In this system, the current variations of the main spindle and feeding motors are measured using hall sensors. And the relationship between the cutting force and the spindle motor RMS (Root Mean Square) current at various spindle rotational speeds is obtained. Thermocouples are used to measure temperature variations of important heat sources of a machine tool. Also, a rule-based expert system is applied in order to decide the machining process and machine tool are in normal conditions. Finally, the effectiveness of the developed system is verified through a series of experiments.
基金Supported by the National Program on Key Basic Re-search Project of China (G1999035801)
文摘With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
基金supported in part by the National Science and Technology Major Project of China (2011ZX 05026-001-06)the National Natural Science Foundation of China (51249005 60972153)
文摘Marine risers play a key role in the deep and ultra-deep water oil and gas production. The vortex-induced vibration (VIV) of marine risers constitutes an important problem in deep water oil exploration and production. VIV will result in high rates of structural failure of marine riser due to fatigue damage accumulation and diminishes the riser fatigue life. In-service monitoring or full scale testing is essential to improve our understanding of V1V response and enhance our ability to predict fatigue damage. One ma- rine riser fatigue acoustic telemetry scheme is proposed and an engineering prototype machine has been developed to monitor deep and ultra-deep water risers' fatigue and failure that can diminish the riser fatigue life and lead to economic losses and eco-catastrophe. Many breakthroughs and innovation have been achieved in the process of developing an engineering prototype machine. Sea trials were done on the 6th generation deep-water drilling platform HYSY-981 in the South China Sea. The inclination monitoring results show that the marine riser fatigue acoustic telemetry scheme is feasible and reliable and the engineering prototype machine meets the design criterion and can match the requirements of deep and ultra-deep water riser fatigue monitoring. The rich experience and field data gained in the sea trial which provide much technical support for optimization in the engineering prototype machine in the future.
基金Supported by National 242 Plan Project(2005C48)the Technology Innovation Programme Major Projects of Beijing Institute of Technology(2011CX01015)
文摘Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions.
文摘Electrical machines are precarious mechanisms in manufacturing practices. A motor failure may yield an unexpected interruption at the industrial plant, with consequences in costs, product quality, and security. To govern the conditions of each part of motor, various testing and monitoring methods have been developed. In this paper, a review on effective fault indicators and vibration based condition monitoring approaches of rotating electrical machines has been accomplished. The determination of the review is to progress the understanding of vibration based analysis, and its use in the Machine Health Monitoring. A variety of analysis was identified to highlight the concept of predictive maintenance in industries. The techniques of vibration analysis were investigated to detect both healthy and fault related signals of rotating machineries.
文摘During the oil production, in order to monitor the working conditions of an electrical submersible pump (ESP),an electrical current recorder is used to monitor the electric motor current of an ESP. The recorder charts indicate various working conditions of the ESP. Subtle malfunctions or abnormal problems of the ESP can be detected and further analyzed from various features of these current curves on the recording charts. Presently, these current charts are manually read and analyzed in oil fields. In this paper, a diagnosis expert system is presented for automatically analyzing these current recording charts and identifying the working condition of the ESP. This expert system includes an open knowledge base, which can be updated or enriched according to the identified features of the current curves on the recording charts, and a condition monitoring and failure pattern recognition method, which is called "pick-up method of feature of the recording chart", and can be correctly applied in most cases. It has been shown that this expert system can effectively improve the accuracy and efficiency of failure diagnosis and working condition monitoring of ESPs.
基金National High Technical Research and Development Program of China(863 Program)under Grant No. 2008AA01Z414
文摘Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss.
文摘With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the vip operating system runs on the virtual machine monitor as non-privileged mode. The redirecting and monitoring modules are added into the virtual machine monitor. When a vip application is calling a system call, it is trapped and redirected from the least privileged level into the virtual machine monitor running in the most privileged level. After logging is finished. it returns to the vip operating system running in the more privileged level and starts the system call. Compared with the traditional methods for logging system activities, the novel method makes it more difficult to destroy or tamper the logs. The preliminary evaluation shows that the prototype is simple and efficient.
文摘This paper analyses the error sources in neural network prediction. The relationship between prediction error and quality of training sets is revealed. The influence of quality of training sets on the performance of an artificial neural network(ANN) applied in time series prediction is discussed. A numerical criterion called degree of consistency(DCT) defined from the statistical point of view for evaluating quality of training sets is introduced. Some simulation results and corresponding suggestions are presented along with the new criterion in order to properly select the training sets for neural network training.
文摘Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the interface be- tween OS and VMM complex. This results in a code base that is very hard to verify the security of the VMM. For exam- ple, a misuse of a VMM hyper-call by a malicious vip OS can corrupt the whole VMM. The complexity of the VMM also makes it hard to formally verify the correctness of the system's behavior. In this paper a new VMM, operating sys- tem virtualization (OSV), is proposed. The multiprocessor boot interface and memory configuration interface are virtu- alized in OSV at boot time in the Linux kernel. After booting, only inter-processor interrupt operations are intercepted by OSV, which makes the interface between OSV and OS sim- ple. The interface is verified using formal model checking, which ensures a malicious OS cannot attack OSV through the interface. Currently, OSV is implemented based on the AMD Opteron multi-core server architecture. Evaluation re- sults show that Linux running on OSV has a similar perfor- mance to native Linux. OSV has a performance improvement of 4%-13% over Xen.
基金project of Technical Aspects of Monitoring the Acoustic Quality of Infrastructure in Road Transport(3714541000)commissioned by the German Federal Environment Agencyfunded by the Federal Ministry for the Environment,Nature Conservation,Building and Nuclear Safety,Germany,within the Environmental Research Plan 2014.
文摘The condition of the road infrastructure has severe impacts on the road safety, driving comfort, and on the rolling resistance. Therefore, the road infrastructure must be moni- tored comprehensively and in regular intervals to identify damaged road segments and road hazards. Methods have been developed to comprehensively and automatically digitize the road infrastructure and estimate the road quality, which are based on vehicle sensors and a supervised machine learning classification. Since different types of vehicles have various suspension systems with different response functions, one classifier cannot be taken over to other vehicles. Usually, a high amount of time is needed to acquire training data for each individual vehicle and classifier. To address this problem, the methods to collect training data automatically for new vehicles based on the comparison of trajectories of untrained and trained vehicles have been developed. The results show that the method based on a k-dimensional tree and Euclidean distance performs best and is robust in transferring the information of the road surface from one vehicle to another. Furthermore, this method offers the possibility to merge the output and road infrastructure information from multiple vehicles to enable a more robust and precise prediction of the ground truth.
文摘Static cache partitioning can reduce inter- application cache interference and improve the composite performance of a cache-polluted application and a cache- sensitive application when they run on cores that share the last level cache in the same multi-core processor. In a virtu- alized system, since different applications might run on dif- ferent virtual machines (VMs) in different time, it is inappli- cable to partition the cache statically in advance. This paper proposes a dynamic cache partitioning scheme that makes use of hot page detection and page migration to improve the com- posite performance of co-hosted virtual machines dynami- cally according to prior knowledge of cache-sensitive appli- cations. Experimental results show that the overhead of our page migration scheme is low, while in most cases, the com- posite performance is an improvement over free composition.
基金This work was supported by the National High Technology Research and Development 863 Program of China under Grant No. 2012AA010905, the National Natural Science Foundation of China under Grant Nos. 61272100 and 61202374, the Ministry of Education Major Project of China under Grant No. 313035, and the National Research Foundation (NRF) Singapore under its CREATE Program.
文摘The increasing requirements of intensive interoperaterbility among the distributed nodes desiderate the high performance network connections, owing to the substantial growth of cloud computing and datacenters. Network I/O virtualization aggregates the network resource and separates it into manageable parts for particular servers or devices, which provides effective consolidation and elastic management with high agility, flexibility and scalability as well as reduced cost and cabling. However, both network I/O virtualization aggregation and the increasing network speed incur higher traffic density, which generates a heavy system stress for I/O data moving and I/O event processing. Consequently, many researchers have dedicated to enhancing the system performance and alleviating the system overhead for high performance networking virtualizatiou. This paper first elaborates the mainstreaming I/O virtualization methodologies, including device emulation, split-driver model and hardware assisted model. Then, the paper discusses and compares their specific advantages in addition to performance bottlenecks in practical utilities. This paper mainly focuses on the comprehensive survey of state- of-the-art approaches for performance optimizations and improvements as well as the portability management for network I/O virtualization. The approaches include various novel data delivery schemes, overhead mitigations for interrupt processing and adequate resource allocations for dynamic network states. Finally, we highlight the diversity of I/O virtualization besides the performance improvements in network virtualization infrastructure.