The virtualized radio access network(v RAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network(RAN) significantly.In this paper,a...The virtualized radio access network(v RAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network(RAN) significantly.In this paper,a Not Only Stack(NO Stack) based vR AN is proposed to be employed in the fifth generation(5G) mobile communication system.It adopts advanced virtualization technologies to maintain flexible and sustainable.The baseband processing and storage resources should be sliced and orchestrated agilely to support multi radio access technology(multiRAT) .Also it is analyzed and demonstrated by different use cases to validate the benefits.The proposed v RAN reduces signaling overheads and service response time in the bearer establishment procedure.Concluded from the analyses and demonstrations,the NO Stack based v RAN could support multi-RAT convergence and flexible networking effectively.展开更多
This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and...This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and cost points of view. This paper discusses the importance of components with respect to system availability. Specifically, we introduce two different component importance analyses for hybrid model (fault trees and continuous-time Markov chains) and continuous-time Markov chains, and show the analysis for existing probabilistic models for virtualized system. In numerical examples, we illustrate the quantitative component importance analysis for virtualized system with live migration.展开更多
In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significa...In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significantly improve the utilization efficiency of computing resources. In this paper,we study the computing resource allocation strategy for one VBS by considering the non-negligible effect of delay introduced by switches. Specifically,we formulate the VBS's sum computing rate maximization as a set optimization problem. To address this problem,we firstly propose a computing resource schedule algorithm,namely,weight before one-step-greedy(WBOSG),which has linear computation complexity and considerable performance. Then,OSG retreat(OSG-R) algorithm is developed to further improve the system performance at the expense of computational complexity. Simulation results under practical setting are provided to validate the proposed two algorithms.展开更多
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s...Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.展开更多
To save cost, more and more users choose provision resources at the granularity of virtual machines in cluster systems, especially data centres. Maintaining a consistent member view is the foundation of reliable clust...To save cost, more and more users choose provision resources at the granularity of virtual machines in cluster systems, especially data centres. Maintaining a consistent member view is the foundation of reliable cluster managements, and it also raises several challenge issues for large scale cluster systems deployed with virtual machines (which we call virtualized clusters). In this paper, we introduce our experience in design and implementation of scalable member view management on large-scale virtual clusters. Our research contributions include three-aspects : 1 ) we propose a scalable and reliable management infrastructure that combines a peer-to-peer structure and a hierarchy structure to maintain a consistent member view in virtual clusters; 2 ) we present a light-weighted group membership algorithm that can reach the consistent member view within a single round of message exchange; 3 ) we design and implement a scalable membership service that can provide virtual machines and maintain a consistent member view in virtual clusters. Our work is verified on Dawning 5000A, which ranked No. 10 of Top 500 super computers in November, 2008.展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network b...Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network bandwidth, and battery capacity in a mobile phone. While applications can be redesigned with client-server models to benefit from cloud services, users are no longer in full control of the application. This is also a serious concern. We propose an innovative framework for executing mobile applications in a virfualized cloud environment. With encryption and isolation, this environment is controlled by the user and protected against eavesdropping from cloud providers. We have developed efficient schemes for migrating applications and synchronizing data between execution environments. Performance and power issues within a virtualized execution environment are also addressed using power saving and scheduling techniques that enable automatic, seamless application migration.展开更多
Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. ...Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations.展开更多
Cloud computing technology facilitates computing-intensive applications by providing virtualized resources which can be dynamically provisioned. However, user’s requests are varied according to different applications...Cloud computing technology facilitates computing-intensive applications by providing virtualized resources which can be dynamically provisioned. However, user’s requests are varied according to different applications’ computation ability needs. These applications can be presented as meta-job of user’s demand. The total processing time of these jobs may need data transmission time over the Internet as well as the completed time of jobs to execute on the virtual machine must be taken into account. In this paper, we presented V-heuristics scheduling algorithm for allocation of virtualized network and computing resources under user’s constraint which applied into a service-oriented resource broker for jobs scheduling. This scheduling algorithm takes into account both data transmission time and computation time that related to virtualized network and virtual machine. The simulation results are compared with three different types of heuristic algorithms under conventional network or virtual network conditions such as MCT, Min-Min and Max-Min. e evaluate these algorithms within a simulated cloud environment via an abilenenetwork topology which is real physical core network topology. These experimental results show that V-heuristic scheduling algorithm achieved significant performance gain for a variety of applications in terms of load balance, Makespan, average resource utilization and total processing time.展开更多
In this paper,under the premise of analyzing the necessities to carry out computer virtualized education in modem education and based on computer virtualized training's value embodied in education,the ways to real...In this paper,under the premise of analyzing the necessities to carry out computer virtualized education in modem education and based on computer virtualized training's value embodied in education,the ways to realize the educational value of computer virtualized training are elaborated.Computer virtualized training is of great significance to the diversity of education and the modernization development.展开更多
In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecomm...In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecommunications networks,the need for high-end security and efficient management of these large data files is a great challenge for network designers.The proposed model provides the efficient real-time virtual data storage of UE data files(light and heavy)using an object storage system MinIO having inbuilt Software Development Kits(SDKs)that are compatible with Amazon(S3)Application Program Interface(API)making operations like file uploading,and data retrieval extremely efficient as compared to legacy virtual storage system requiring low-level HTTP requests for data management.To provide integrity,authenticity,and confidentiality(integrity checking via an authentication tag)to the data files of UE,the encrypted algorithm 256-bit oriented-Advanced Encryption Standard(256-AES)in Galois/Counter Mode(GCM)is utilized in combination with MinIO.The AES-based MinIO signifies in more secure and faster approach than older models like Cipher Block Chaining(CBC).The performance of the proposed model is analyzed using the Iperf utility to perform the Teletraffic parametric(bandwidth,throughput,latency,and transmission delay)analysis for three different cases namely:(a)light UE traffic(uploading and retrieval)(b)heavy UE traffic(uploading and retrieval)and(c)comparison of Teletraffic parameters namely:bandwidth(Bava),throughput(Tput),data transfer(D_(Trans)),latency(L_(ms)),and transmission delay(TDelay)obtained from proposed method with legacy virtual storage methods.The results show that the suggested MinIO-based system outperforms conventional systems in terms of latency,encryption efficiency,and performance under varying data load conditions.展开更多
This article addresses the challenges associatedwith three-dimensional(3D)design models in the power industry,such as substantial data volume and complex calculations.Traditional data exchange methods pose difficultie...This article addresses the challenges associatedwith three-dimensional(3D)design models in the power industry,such as substantial data volume and complex calculations.Traditional data exchange methods pose difficulties in coordinating design efforts among project participants,and current computing systems cannot meet the performance demands of 3D power design.To overcome these challenges,this study thoroughly evaluates both public and private clouds and ultimately selects a hybrid cloud infrastructure for a custom-built 3D design platform that addresses the specific needs of the power industry.Employing optimization algorithms for 3D design models,we reduce model size and implement automated synchronization of platform data through code.We also propose different levels of cloud services and identify the necessary functionalities to be fulfilled by each layer of the 3D design cloud platform.Nested virtualization technology is used to create cloud desktops with different hardware requirements.Ultimately,we successfully establish a comprehensive framework for a 3D design platform specifically tailored to power design enterprises.展开更多
Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the u...Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the use of virtual reality(VR)technology.VR has been demonstrated to be an effective treatment for pain associated with medical procedures,as well as for chronic pain conditions for which no effective treatment has been established.The precise mechanism by which the diversion from reality facilitated by VR contributes to the diminution of pain and anxiety has yet to be elucidated.However,the provision of positive images through VR-based visual stimulation may enhance the functionality of brain networks.The salience network is diminished,while the default mode network is enhanced.Additionally,the medial prefrontal cortex may establish a stronger connection with the default mode network,which could result in a reduction of pain and anxiety.Further research into the potential of VR technology to alleviate pain could lead to a reduction in the number of individuals who overdose on painkillers and contribute to positive change in the medical field.展开更多
Objectives:To explore the efficacy and safety of virtual reality(VR)in relieving negative emotions in patients with breast cancer with different personalities.Methods:A randomized controlled trial was conducted.Betwee...Objectives:To explore the efficacy and safety of virtual reality(VR)in relieving negative emotions in patients with breast cancer with different personalities.Methods:A randomized controlled trial was conducted.Between April 2023 and October 2023,we enrolled patients with breast cancer treated in the Department of Breast Cancer and Oncology at Sun Yat-Sen Memorial Hospital,Sun Yat-Sen University,Guangdong Province.The patients were randomly divided into an intervention group(n=118)and a control group(n=119)using block randomization.The intervention group received the VR intervention 3-5 times over 5±2 weeks using natural landscapes with music or relaxation guidance,and the duration of each VR intervention was 15±3 min.The control group received routine nursing care,including disease education and psychological counseling.Patients were assessed using the Type D Scale,Positive and Negative Affect Scale,and Distress Thermometer,and adverse events during the intervention were recorded.Results:Overall,85 patients completed the study(44 in the intervention group and 41 in the control group).Patients with Type D personalities showed more negative emotions[25.0(21.5,27.5)vs.19.0(16.0,24.0),P=0.001]and distressed attitudes[4.0(2.0,5.0)vs.3.0(1.0,4.0),P=0.020]with fewer positive emotions(27.2±5.6 vs.31.0±5.9,P=0.014)than those with non-Type D personalities.Total population analysis revealed no significant differences between the groups.However,in the subgroup analysis,patients with Type D personalities in the intervention group showed greater relief from negative emotions than those in the control group[median difference,-5.0(-9.0,-2.5)vs.-2.0(-4.0,2.0),P=0.046].No significant differences were found between groups of patients with non-Type D personality traits.The proportion of adverse events was not significantly different between groups(P=0.110).Conclusions:Breast cancer patients with Type D personalities suffer more severe negative emotions and distress,and more attention should be paid to them.VR intervention significantly and safely reduced negative emotions in patients with Type D personalities.展开更多
As the penetration rate of distributed energy increases,the transient power angle stability problem of the virtual synchronous generator(VSG)has gradually become prominent.In view of the situation that the grid impeda...As the penetration rate of distributed energy increases,the transient power angle stability problem of the virtual synchronous generator(VSG)has gradually become prominent.In view of the situation that the grid impedance ratio(R/X)is high and affects the transient power angle stability of VSG,this paper proposes a VSG transient power angle stability control strategy based on the combination of frequency difference feedback and virtual impedance.To improve the transient power angle stability of the VSG,a virtual impedance is adopted in the voltage loop to adjust the impedance ratio R/X;and the PI control feedback of the VSG frequency difference is introduced in the reactive powervoltage link of theVSGto enhance the damping effect.Thesecond-orderVSGdynamic nonlinearmodel considering the reactive power-voltage loop is established and the influence of different proportional integral(PI)control parameters on the system balance stability is analyzed.Moreover,the impact of the impedance ratio R/X on the transient power angle stability is presented using the equal area criterion.In the simulations,during the voltage dips with the reduction of R/X from 1.6 to 0.8,Δδ_(1)is reduced from 0.194 rad to 0.072 rad,Δf_(1)is reduced from 0.170 to 0.093 Hz,which shows better transient power angle stability.Simulation results verify that compared with traditional VSG,the proposedmethod can effectively improve the transient power angle stability of the system.展开更多
Phantom limb pain(PLP)is not only a physical pain experience but also poses a significant challenge to mental health and quality of life.Currently,the mechanism of PLP treatment is still unclear,and there are many met...Phantom limb pain(PLP)is not only a physical pain experience but also poses a significant challenge to mental health and quality of life.Currently,the mechanism of PLP treatment is still unclear,and there are many methods with varying effects.This article starts with the application research of extended reality technology in PLP treatment,through describing the application of its branch technologies(virtual reality,augmented reality,and mixed reality technology),to lay the foundation for subsequent research,in the hope of finding advanced and effective treatment methods,and providing a basis for future product transformation.展开更多
Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific stai...Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific staining procedures involving carcinogenic chemicals.This study proposes an interdisciplinary approach merging materials science,medicine,and artificial intelligence(AI)to develop a virtual staining technique and intelligent evaluation model based on deep learning for chronic wound tissue pathology.This innovation aims to enhance clinical diagnosis and treatment by offering personalized AI-driven therapeutic strategies.By establishing a mouse model of chronic wounds and using a series of hydrogel wound dressings,tissue pathology sections were periodically collected for manual staining and healing assessment.We focused on leveraging the pix2pix image translation framework within deep learning networks.Through CNN models implemented in Python using PyTorch,our study involves learning and feature extraction for region segmentation of pathological slides.Comparative analysis between virtual staining and manual staining results,along with healing diagnosis conclusions,aims to optimize AI models.Ultimately,this approach integrates new metrics such as image recognition,quantitative analysis,and digital diagnostics to formulate an intelligent wound assessment model,facilitating smart monitoring and personalized treatment of wounds.In blind evaluation by pathologists,minimal disparities were found between virtual and conventional histologically stained images of murine wound tissue.The evaluation used pathologists’average scores on real stained images as a benchmark.The scores for virtual stained images were 71.1%for cellular features,75.4%for tissue structures,and 77.8%for overall assessment.Metrics such as PSNR(20.265)and SSIM(0.634)demonstrated our algorithms’superior performance over existing networks.Eight pathological features such as epidermis,hair follicles,and granulation tissue can be accurately identified,and the images were found to be more faithful to the actual tissue feature distribution when compared to manually annotated data.展开更多
The use of virtual reality to educate preoperative patients has a positive impact on nurses as well as patients undergoing treatment.It can help improve patient satisfaction and improve favorable outcomes by reducing ...The use of virtual reality to educate preoperative patients has a positive impact on nurses as well as patients undergoing treatment.It can help improve patient satisfaction and improve favorable outcomes by reducing patient anxiety and proving adequate knowledge about the procedure and possible outcomes to the patient.It also reduces burden on nursing staff and counsellors.Larger and more diverse cohort studies will help us understand the wider application of this tool on the patient population.It may be difficult to apply this tool on elderly patients with failing eyesight,multiple physical comorbidities.Also,there may be reduced acceptance of this modality by older nursing staff and practitioners who may prefer the traditional verbal version for counselling.We will benefit from a combined approach of using virtual reality apps with tradition one-on-one counselling to help alleviate patient concerns and improve patient and healthcare professional satisfaction.展开更多
基金supported by the China's 863 Project(No.2015AA01A706)the National Science and Technology Major Project(No.2016ZX03001017)+1 种基金the Science and Technology Program of Beijing(No.D161100001016002)the Science and Technology Cooperation Projects(No.2015DFT10160B)
文摘The virtualized radio access network(v RAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network(RAN) significantly.In this paper,a Not Only Stack(NO Stack) based vR AN is proposed to be employed in the fifth generation(5G) mobile communication system.It adopts advanced virtualization technologies to maintain flexible and sustainable.The baseband processing and storage resources should be sliced and orchestrated agilely to support multi radio access technology(multiRAT) .Also it is analyzed and demonstrated by different use cases to validate the benefits.The proposed v RAN reduces signaling overheads and service response time in the bearer establishment procedure.Concluded from the analyses and demonstrations,the NO Stack based v RAN could support multi-RAT convergence and flexible networking effectively.
文摘This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and cost points of view. This paper discusses the importance of components with respect to system availability. Specifically, we introduce two different component importance analyses for hybrid model (fault trees and continuous-time Markov chains) and continuous-time Markov chains, and show the analysis for existing probabilistic models for virtualized system. In numerical examples, we illustrate the quantitative component importance analysis for virtualized system with live migration.
基金funded by the key project of the National Natural Science Foundation of China (No.61431001)the National High-Tech R&D Program (863 Program 2015AA01A705)New Technology Star Plan of Beijing (No.xx2013052)
文摘In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significantly improve the utilization efficiency of computing resources. In this paper,we study the computing resource allocation strategy for one VBS by considering the non-negligible effect of delay introduced by switches. Specifically,we formulate the VBS's sum computing rate maximization as a set optimization problem. To address this problem,we firstly propose a computing resource schedule algorithm,namely,weight before one-step-greedy(WBOSG),which has linear computation complexity and considerable performance. Then,OSG retreat(OSG-R) algorithm is developed to further improve the system performance at the expense of computational complexity. Simulation results under practical setting are provided to validate the proposed two algorithms.
基金This work was partly supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT),(No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the MSIT(Ministry of Science and ICT),Korea(No.IITP-2022-2020-0-01602,ITRC(Information Technology Research Center)support program,50%).
文摘Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.
基金Supported by the High Technology Research and Development Programme of China (No. 2006AA01 A102, 2009AA01 A129 ) and the National Natural Science Foundation of China ( No. 60703020).
文摘To save cost, more and more users choose provision resources at the granularity of virtual machines in cluster systems, especially data centres. Maintaining a consistent member view is the foundation of reliable cluster managements, and it also raises several challenge issues for large scale cluster systems deployed with virtual machines (which we call virtualized clusters). In this paper, we introduce our experience in design and implementation of scalable member view management on large-scale virtual clusters. Our research contributions include three-aspects : 1 ) we propose a scalable and reliable management infrastructure that combines a peer-to-peer structure and a hierarchy structure to maintain a consistent member view in virtual clusters; 2 ) we present a light-weighted group membership algorithm that can reach the consistent member view within a single round of message exchange; 3 ) we design and implement a scalable membership service that can provide virtual machines and maintain a consistent member view in virtual clusters. Our work is verified on Dawning 5000A, which ranked No. 10 of Top 500 super computers in November, 2008.
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
基金supported in part by a grant from the National Science Council under No. 98-2220-E-002-020, 99-2220-E-002-026, and 95-2221-E-002-098-MY3
文摘Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network bandwidth, and battery capacity in a mobile phone. While applications can be redesigned with client-server models to benefit from cloud services, users are no longer in full control of the application. This is also a serious concern. We propose an innovative framework for executing mobile applications in a virfualized cloud environment. With encryption and isolation, this environment is controlled by the user and protected against eavesdropping from cloud providers. We have developed efficient schemes for migrating applications and synchronizing data between execution environments. Performance and power issues within a virtualized execution environment are also addressed using power saving and scheduling techniques that enable automatic, seamless application migration.
基金supported in part by the grant from the National Natural Science Foundation of China (60973129)
文摘Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations.
文摘Cloud computing technology facilitates computing-intensive applications by providing virtualized resources which can be dynamically provisioned. However, user’s requests are varied according to different applications’ computation ability needs. These applications can be presented as meta-job of user’s demand. The total processing time of these jobs may need data transmission time over the Internet as well as the completed time of jobs to execute on the virtual machine must be taken into account. In this paper, we presented V-heuristics scheduling algorithm for allocation of virtualized network and computing resources under user’s constraint which applied into a service-oriented resource broker for jobs scheduling. This scheduling algorithm takes into account both data transmission time and computation time that related to virtualized network and virtual machine. The simulation results are compared with three different types of heuristic algorithms under conventional network or virtual network conditions such as MCT, Min-Min and Max-Min. e evaluate these algorithms within a simulated cloud environment via an abilenenetwork topology which is real physical core network topology. These experimental results show that V-heuristic scheduling algorithm achieved significant performance gain for a variety of applications in terms of load balance, Makespan, average resource utilization and total processing time.
文摘In this paper,under the premise of analyzing the necessities to carry out computer virtualized education in modem education and based on computer virtualized training's value embodied in education,the ways to realize the educational value of computer virtualized training are elaborated.Computer virtualized training is of great significance to the diversity of education and the modernization development.
文摘In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecommunications networks,the need for high-end security and efficient management of these large data files is a great challenge for network designers.The proposed model provides the efficient real-time virtual data storage of UE data files(light and heavy)using an object storage system MinIO having inbuilt Software Development Kits(SDKs)that are compatible with Amazon(S3)Application Program Interface(API)making operations like file uploading,and data retrieval extremely efficient as compared to legacy virtual storage system requiring low-level HTTP requests for data management.To provide integrity,authenticity,and confidentiality(integrity checking via an authentication tag)to the data files of UE,the encrypted algorithm 256-bit oriented-Advanced Encryption Standard(256-AES)in Galois/Counter Mode(GCM)is utilized in combination with MinIO.The AES-based MinIO signifies in more secure and faster approach than older models like Cipher Block Chaining(CBC).The performance of the proposed model is analyzed using the Iperf utility to perform the Teletraffic parametric(bandwidth,throughput,latency,and transmission delay)analysis for three different cases namely:(a)light UE traffic(uploading and retrieval)(b)heavy UE traffic(uploading and retrieval)and(c)comparison of Teletraffic parameters namely:bandwidth(Bava),throughput(Tput),data transfer(D_(Trans)),latency(L_(ms)),and transmission delay(TDelay)obtained from proposed method with legacy virtual storage methods.The results show that the suggested MinIO-based system outperforms conventional systems in terms of latency,encryption efficiency,and performance under varying data load conditions.
基金supported by the Innovation Project of China Energy EngineeringGroup Co.,Ltd.-Electrical 3DDesign Software for Substations(Converter Stations).
文摘This article addresses the challenges associatedwith three-dimensional(3D)design models in the power industry,such as substantial data volume and complex calculations.Traditional data exchange methods pose difficulties in coordinating design efforts among project participants,and current computing systems cannot meet the performance demands of 3D power design.To overcome these challenges,this study thoroughly evaluates both public and private clouds and ultimately selects a hybrid cloud infrastructure for a custom-built 3D design platform that addresses the specific needs of the power industry.Employing optimization algorithms for 3D design models,we reduce model size and implement automated synchronization of platform data through code.We also propose different levels of cloud services and identify the necessary functionalities to be fulfilled by each layer of the 3D design cloud platform.Nested virtualization technology is used to create cloud desktops with different hardware requirements.Ultimately,we successfully establish a comprehensive framework for a 3D design platform specifically tailored to power design enterprises.
文摘Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the use of virtual reality(VR)technology.VR has been demonstrated to be an effective treatment for pain associated with medical procedures,as well as for chronic pain conditions for which no effective treatment has been established.The precise mechanism by which the diversion from reality facilitated by VR contributes to the diminution of pain and anxiety has yet to be elucidated.However,the provision of positive images through VR-based visual stimulation may enhance the functionality of brain networks.The salience network is diminished,while the default mode network is enhanced.Additionally,the medial prefrontal cortex may establish a stronger connection with the default mode network,which could result in a reduction of pain and anxiety.Further research into the potential of VR technology to alleviate pain could lead to a reduction in the number of individuals who overdose on painkillers and contribute to positive change in the medical field.
基金supported by a project of the National Natural Science Foundation of China:Research on the integration of artificial intelligence and virtual reality technology to promote psychological rehabilitation of breast cancer patients with different personalities(project approval no.82073408).
文摘Objectives:To explore the efficacy and safety of virtual reality(VR)in relieving negative emotions in patients with breast cancer with different personalities.Methods:A randomized controlled trial was conducted.Between April 2023 and October 2023,we enrolled patients with breast cancer treated in the Department of Breast Cancer and Oncology at Sun Yat-Sen Memorial Hospital,Sun Yat-Sen University,Guangdong Province.The patients were randomly divided into an intervention group(n=118)and a control group(n=119)using block randomization.The intervention group received the VR intervention 3-5 times over 5±2 weeks using natural landscapes with music or relaxation guidance,and the duration of each VR intervention was 15±3 min.The control group received routine nursing care,including disease education and psychological counseling.Patients were assessed using the Type D Scale,Positive and Negative Affect Scale,and Distress Thermometer,and adverse events during the intervention were recorded.Results:Overall,85 patients completed the study(44 in the intervention group and 41 in the control group).Patients with Type D personalities showed more negative emotions[25.0(21.5,27.5)vs.19.0(16.0,24.0),P=0.001]and distressed attitudes[4.0(2.0,5.0)vs.3.0(1.0,4.0),P=0.020]with fewer positive emotions(27.2±5.6 vs.31.0±5.9,P=0.014)than those with non-Type D personalities.Total population analysis revealed no significant differences between the groups.However,in the subgroup analysis,patients with Type D personalities in the intervention group showed greater relief from negative emotions than those in the control group[median difference,-5.0(-9.0,-2.5)vs.-2.0(-4.0,2.0),P=0.046].No significant differences were found between groups of patients with non-Type D personality traits.The proportion of adverse events was not significantly different between groups(P=0.110).Conclusions:Breast cancer patients with Type D personalities suffer more severe negative emotions and distress,and more attention should be paid to them.VR intervention significantly and safely reduced negative emotions in patients with Type D personalities.
基金supported by theMajor Science and Technology Projects of China Southern Power Grid(Grant number CGYKJXM20210328).
文摘As the penetration rate of distributed energy increases,the transient power angle stability problem of the virtual synchronous generator(VSG)has gradually become prominent.In view of the situation that the grid impedance ratio(R/X)is high and affects the transient power angle stability of VSG,this paper proposes a VSG transient power angle stability control strategy based on the combination of frequency difference feedback and virtual impedance.To improve the transient power angle stability of the VSG,a virtual impedance is adopted in the voltage loop to adjust the impedance ratio R/X;and the PI control feedback of the VSG frequency difference is introduced in the reactive powervoltage link of theVSGto enhance the damping effect.Thesecond-orderVSGdynamic nonlinearmodel considering the reactive power-voltage loop is established and the influence of different proportional integral(PI)control parameters on the system balance stability is analyzed.Moreover,the impact of the impedance ratio R/X on the transient power angle stability is presented using the equal area criterion.In the simulations,during the voltage dips with the reduction of R/X from 1.6 to 0.8,Δδ_(1)is reduced from 0.194 rad to 0.072 rad,Δf_(1)is reduced from 0.170 to 0.093 Hz,which shows better transient power angle stability.Simulation results verify that compared with traditional VSG,the proposedmethod can effectively improve the transient power angle stability of the system.
文摘Phantom limb pain(PLP)is not only a physical pain experience but also poses a significant challenge to mental health and quality of life.Currently,the mechanism of PLP treatment is still unclear,and there are many methods with varying effects.This article starts with the application research of extended reality technology in PLP treatment,through describing the application of its branch technologies(virtual reality,augmented reality,and mixed reality technology),to lay the foundation for subsequent research,in the hope of finding advanced and effective treatment methods,and providing a basis for future product transformation.
基金supported by the Fundamental Research Funds for the Central Universities(No.20720230037)the National Natural Science Foundation of China(No.52273305)+2 种基金Natural Science Foundation of Fujian Province of China(No.2023J05012)State Key Laboratory of Vaccines for Infectious Diseases,Xiang An Biomedicine Laboratory(Nos.2023XAKJ0103071,2023XAKJ0102061)Natural Science Foundation of Xiamen,China(No.3502Z20227010).
文摘Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific staining procedures involving carcinogenic chemicals.This study proposes an interdisciplinary approach merging materials science,medicine,and artificial intelligence(AI)to develop a virtual staining technique and intelligent evaluation model based on deep learning for chronic wound tissue pathology.This innovation aims to enhance clinical diagnosis and treatment by offering personalized AI-driven therapeutic strategies.By establishing a mouse model of chronic wounds and using a series of hydrogel wound dressings,tissue pathology sections were periodically collected for manual staining and healing assessment.We focused on leveraging the pix2pix image translation framework within deep learning networks.Through CNN models implemented in Python using PyTorch,our study involves learning and feature extraction for region segmentation of pathological slides.Comparative analysis between virtual staining and manual staining results,along with healing diagnosis conclusions,aims to optimize AI models.Ultimately,this approach integrates new metrics such as image recognition,quantitative analysis,and digital diagnostics to formulate an intelligent wound assessment model,facilitating smart monitoring and personalized treatment of wounds.In blind evaluation by pathologists,minimal disparities were found between virtual and conventional histologically stained images of murine wound tissue.The evaluation used pathologists’average scores on real stained images as a benchmark.The scores for virtual stained images were 71.1%for cellular features,75.4%for tissue structures,and 77.8%for overall assessment.Metrics such as PSNR(20.265)and SSIM(0.634)demonstrated our algorithms’superior performance over existing networks.Eight pathological features such as epidermis,hair follicles,and granulation tissue can be accurately identified,and the images were found to be more faithful to the actual tissue feature distribution when compared to manually annotated data.
文摘The use of virtual reality to educate preoperative patients has a positive impact on nurses as well as patients undergoing treatment.It can help improve patient satisfaction and improve favorable outcomes by reducing patient anxiety and proving adequate knowledge about the procedure and possible outcomes to the patient.It also reduces burden on nursing staff and counsellors.Larger and more diverse cohort studies will help us understand the wider application of this tool on the patient population.It may be difficult to apply this tool on elderly patients with failing eyesight,multiple physical comorbidities.Also,there may be reduced acceptance of this modality by older nursing staff and practitioners who may prefer the traditional verbal version for counselling.We will benefit from a combined approach of using virtual reality apps with tradition one-on-one counselling to help alleviate patient concerns and improve patient and healthcare professional satisfaction.