1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the es...1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight.展开更多
With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular network...With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular networks(5G).The future sixth generation of mobile cellular networks(6G)is expected to have the capability to support new and unknown services with changing requirements.Hence,in addition to enhancing its capability by 10–100 times compared with 5G,6G should also be intelligent and open to adapt to the ever-changing services in the IoT,which requires a convergence of Communication,Computing and Caching(3C).Based on the analysis of the requirements of new services for 6G,this paper identifies key enabling technologies for an intelligent and open 6G network,all featured with 3C convergence.These technologies cover fundamental and emerging topics,including 3C-based spectrum management,radio channel construction,delay-aware transmission,wireless distributed computing,and network self-evolution.From the detailed analysis of these 3C-based technologies presented in this paper,we can see that although they are promising to enable an intelligent and open 6G,more efforts are needed to realize the expected 6G network.展开更多
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att...Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.展开更多
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n...The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.展开更多
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM...With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.展开更多
The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of applicat...The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of application in the real world.In this paper,according to the function classification,we divide blockchain technology into five layers:the data layer,the network layer,the consensus layer,the contract layer,and the application layer.For each layer,we elaborate on its technical principles and the latest research status.We also provide empirical cases of blockchain application.This paper summarizes the general functional modules of the blockchain to support the rapid implementation of blockchain applications.In the end,we investigate the challenges faced by blockchain technology and present the research prospects.展开更多
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ...In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.展开更多
Cloud computing is a new computing model. The resource monitoring tools are immature compared to traditional distributed computing and grid computing. In order to better monitor the virtual resource in cloud computing...Cloud computing is a new computing model. The resource monitoring tools are immature compared to traditional distributed computing and grid computing. In order to better monitor the virtual resource in cloud computing, a periodically and event-driven push (PEP) monitoring model is proposed. Taking advantage of the push and event-driven mechanism, the model can provide comparatively adequate information about usage and status of the resources. It can simplify the communication between Master and Work Nodes without missing the important issues happened during the push interval. Besides, we develop "mon" to make up for the deficiency of Libvirt in monitoring of virtual CPU and memory.展开更多
Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/method...Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/methodology/approach–This paper provides a comprehensive overview of the definition,connotations,characteristics and key technologies of digital twin technology.It also conducts a thorough analysis of the current state of digital twin applications,with a particular focus on the overall requirements for intelligent operation and maintenance of high-speed railway infrastructure.Using the Jinan Yellow River Bridge on the Beijing–Shanghai high-speed railway as a case study,the paper details the construction process of the twin system from the perspectives of system architecture,theoretical definition,model construction and platform design.Findings–Digital twin technology can play an important role in the whole life cycle management,fault prediction and condition monitoring in the field of high-speed rail operation and maintenance.Digital twin technology is of great significance to improve the intelligent level of high-speed railway operation and management.Originality/value–This paper systematically summarizes the main components of digital twin railway.The general framework of the digital twin bridge is given,and its application in the field of intelligent operation and maintenance is prospected.展开更多
Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that su...Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that supports virtualization applications as well as load migration. Based on the existing technologies, the paper proposes a resource virtualization model (RVM) utilizing a hybrid-graph structure. The hybrid-graph structure can formally represent the critical entities such as private clouds, nodes within the private clouds, and resource including its type and quantity. It also provides a clear description of the logical relationship and the dynamic expansion among them as well. Moreover, based on the RVM, a resource converging algorithm and a maintaining algorithm of the resource pool which can timely reflect the dynamic variation of the private cloud and resource are presented. The algorithms collect resources and put them into the private cloud resource pools and global resource pools, and enable a real-time maintenance for the dynamic variation of resource to ensure the continuity and reliability. Both of the algorithms use a queue structure to accomplish functions of resource converging. Finally, a simulation platform of cloud computing is designed to test the algorithms proposed in the paper. The results show the correctness and the reliability of the algorithms.展开更多
This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation m...This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement.展开更多
The Internet of Moving Things(IoMT)takes a step further with respect to traditional static IoT deployments.In this line,the integration of new eco-friendly mobility devices such as scooters or bicycles within the Coop...The Internet of Moving Things(IoMT)takes a step further with respect to traditional static IoT deployments.In this line,the integration of new eco-friendly mobility devices such as scooters or bicycles within the Cooperative-Intelligent Transportation Systems(C-ITS)and smart city ecosystems is crucial to provide novel services.To this end,a range of communication technologies is available,such as cellular,vehicular WiFi or Low-Power Wide-Area Network(LPWAN);however,none of them can fully cover energy consumption and Quality of Service(QoS)requirements.Thus,we propose a Decision Support System(DSS),based on supervised Machine Learning(ML)classification,for selecting the most adequate transmission interface to send a certain message in a multi-Radio Access Technology(RAT)set up.Different ML algorithms have been explored taking into account computing and energy constraints of IoMT enddevices and traffic type.Besides,a real implementation of a decision tree-based DSS for micro-controller units is presented and evaluated.The attained results demonstrate the validity of the proposal,saving energy in communication tasks as well as satisfying QoS requirements of certain urgent messages.The footprint of the real implementation on an Arduino Uno is 444 bytes and it can be executed in around 50µs.展开更多
In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significa...In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significantly improve the utilization efficiency of computing resources. In this paper,we study the computing resource allocation strategy for one VBS by considering the non-negligible effect of delay introduced by switches. Specifically,we formulate the VBS's sum computing rate maximization as a set optimization problem. To address this problem,we firstly propose a computing resource schedule algorithm,namely,weight before one-step-greedy(WBOSG),which has linear computation complexity and considerable performance. Then,OSG retreat(OSG-R) algorithm is developed to further improve the system performance at the expense of computational complexity. Simulation results under practical setting are provided to validate the proposed two algorithms.展开更多
Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probab...Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probability of offering interaction with the cloud.However,the fog computing characteristics are suscep-tible to counteract the challenges of security.The issues present with the Physical Layer Security(PLS)aspect in fog computing which included authentication,integrity,and confidentiality has been considered as a reason for the potential issues leading to the security breaches.In this work,the Octonion Algebra-inspired Non-Commutative Ring-based Fully Homomorphic Encryption Scheme(NCR-FHE)was proposed as a secrecy improvement technique to overcome the impersonation attack in cloud computing.The proposed approach was derived through the benefits of Octonion algebra to facilitate the maximum security for big data-based applications.The major issues in the physical layer security which may potentially lead to the possible security issues were identified.The potential issues causing the impersonation attack in the Fog computing environment were identified.The proposed approach was compared with the existing encryption approaches and claimed as a robust approach to identify the impersonation attack for the fog and edge network.The computation cost of the proposed NCR-FHE is identified to be significantly reduced by 7.18%,8.64%,9.42%,and 10.36%in terms of communication overhead for varying packet sizes,when compared to the benchmarked ECDH-DH,LHPPS,BF-PHE and SHE-PABF schemes.展开更多
To solve the topology optimization of complicated multi-objective continuous/discrete design variables in aircmit structure design, a Parallel Pareto Genetic Algorithm (PPGA) is presented based on grid platform in t...To solve the topology optimization of complicated multi-objective continuous/discrete design variables in aircmit structure design, a Parallel Pareto Genetic Algorithm (PPGA) is presented based on grid platform in this paper. In the algorithm, the commercial finite element analysis (FEA) software is integrated as the calculating tool for analyzing the objective functions and the filter of Pareto solution set based on weight information is introduced to deal with the relationships among all objectives. Grid technology is utilized in PPGA to realize the distributed computations and the user interface is developed to realize the job submission and job management locally/remotely. Taking the aero-elastic tailoring of a composite wing for optimization as an example, a set of Pareto solutions are obtained for the decision-maker. The numerical results show that the aileron reversal problem can be solved by adding the limited skin weight in this system. The algorithm can be used to solve complicated topology optimization for composite structures in engineering and the computation efficiency can be improved greatly by using the grid platform that aggregates numerous idle resources.展开更多
The relationship between mankind and nature as well mankind and climate was introduced firstly, and then the necessity to remove negative value accompanying the improvement of humanized nature value was analyzed, fina...The relationship between mankind and nature as well mankind and climate was introduced firstly, and then the necessity to remove negative value accompanying the improvement of humanized nature value was analyzed, finally the ways to insist on the unity of natural view and development view to realize the harmony between mankind and climate were proposed.展开更多
Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This pape...Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This paper proposes an on-demand service system using the cloud computing architecture and analyzes important issues such as organization, management, and monitoring of distributed service resources; context-aware on-demand service modeling, on-demand automated service composition in large-scale networks, and service system analysis based on complex system theory. Continuous Operating Reference Station (CORS) of a geo-spatial information system is taken as an example, and its architecture is analyzed from the perspective of cloud computing. Some fundamental questions are raised about its service.展开更多
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra...Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.展开更多
This work started out with the in-depth feasibil-ity study and limitation analysis on the current disease spread estimating and countermea-sures evaluating models, then we identify that the population variability is a...This work started out with the in-depth feasibil-ity study and limitation analysis on the current disease spread estimating and countermea-sures evaluating models, then we identify that the population variability is a crucial impact which has been always ignored or less empha-sized. Taking HIV/AIDS as the application and validation background, we propose a novel al-gorithm model system, EEA model system, a new way to estimate the spread situation, evaluate different countermeasures and analyze the development of ARV-resistant disease strains. The model is a series of solvable ordi-nary differential equation (ODE) models to es-timate the spread of HIV/AIDS infections, which not only require only one year’s data to deduce the situation in any year, but also apply the piecewise constant method to employ multi- year information at the same time. We simulate the effects of therapy and vaccine, then evaluate the difference between them, and offer the smallest proportion of the vaccination in the population to defeat HIV/AIDS, especially the advantage of using the vaccination while the deficiency of using therapy separately. Then we analyze the development of ARV-resistant dis-ease strains by the piecewise constant method. Last but not least, high performance computing (HPC) platform is applied to simulate the situa-tion with variable large scale areas divided by grids, and especially the acceleration rate will come to around 4 to 5.5.展开更多
基金supported in part by the National Natural Science Foundation of China(62025404)in part by the National Key Research and Development Program of China(2022YFB3902802)+1 种基金in part by the Beijing Natural Science Foundation(L241013)in part by the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA000000).
文摘1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight.
基金This work is supported by the National Natural Science Youth Fund of China granted by No.61901452 and Innovative Project of ICT/CAS granted by No.20196110
文摘With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular networks(5G).The future sixth generation of mobile cellular networks(6G)is expected to have the capability to support new and unknown services with changing requirements.Hence,in addition to enhancing its capability by 10–100 times compared with 5G,6G should also be intelligent and open to adapt to the ever-changing services in the IoT,which requires a convergence of Communication,Computing and Caching(3C).Based on the analysis of the requirements of new services for 6G,this paper identifies key enabling technologies for an intelligent and open 6G network,all featured with 3C convergence.These technologies cover fundamental and emerging topics,including 3C-based spectrum management,radio channel construction,delay-aware transmission,wireless distributed computing,and network self-evolution.From the detailed analysis of these 3C-based technologies presented in this paper,we can see that although they are promising to enable an intelligent and open 6G,more efforts are needed to realize the expected 6G network.
基金Supported by the National High-TechnologyResearch and Development Programof China (2002AA1Z2101)
文摘Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.
基金supported in part by the National Science Foundationof China under Grant number 61431001the Beijing Talents Fund under Grant number 2015000021223ZK31
文摘The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.
基金Supported by the National Program on Key Basic Re-search Project of China (G1999035801)
文摘With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
基金Supported by the National Natural Science Foundation of China(61762049,61862033,61902162)Natural Science Foundation of Jiangxi Province(20202BABL202025,20202BABL202026,20202BAB202015)。
文摘The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of application in the real world.In this paper,according to the function classification,we divide blockchain technology into five layers:the data layer,the network layer,the consensus layer,the contract layer,and the application layer.For each layer,we elaborate on its technical principles and the latest research status.We also provide empirical cases of blockchain application.This paper summarizes the general functional modules of the blockchain to support the rapid implementation of blockchain applications.In the end,we investigate the challenges faced by blockchain technology and present the research prospects.
基金The Natural Science Foundation of Henan Province(No.232300421097)the Program for Science&Technology Innovation Talents in Universities of Henan Province(No.23HASTIT019,24HASTIT038)+2 种基金the China Postdoctoral Science Foundation(No.2023T160596,2023M733251)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University(No.2023D11)the Song Shan Laboratory Foundation(No.YYJC022022003)。
文摘In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.
基金Project supported by the Shanghai Leading Academic Discipline Project(Grant No.J50103)the Ph D Programs Foundation of Ministry of Education of China(Grant No.200802800007)+1 种基金the Key Laboratory of Computer System and Architecture(Institute of Computing Technology,Chinese Academy of Sciences)the Innovation Project of Shanghai Municipal Education Commission(Grant No.11YZ09)
文摘Cloud computing is a new computing model. The resource monitoring tools are immature compared to traditional distributed computing and grid computing. In order to better monitor the virtual resource in cloud computing, a periodically and event-driven push (PEP) monitoring model is proposed. Taking advantage of the push and event-driven mechanism, the model can provide comparatively adequate information about usage and status of the resources. It can simplify the communication between Master and Work Nodes without missing the important issues happened during the push interval. Besides, we develop "mon" to make up for the deficiency of Libvirt in monitoring of virtual CPU and memory.
基金funded by the China State Railway Group Co.,Ltd.Science and technology research and development program project(K2023G085).
文摘Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/methodology/approach–This paper provides a comprehensive overview of the definition,connotations,characteristics and key technologies of digital twin technology.It also conducts a thorough analysis of the current state of digital twin applications,with a particular focus on the overall requirements for intelligent operation and maintenance of high-speed railway infrastructure.Using the Jinan Yellow River Bridge on the Beijing–Shanghai high-speed railway as a case study,the paper details the construction process of the twin system from the perspectives of system architecture,theoretical definition,model construction and platform design.Findings–Digital twin technology can play an important role in the whole life cycle management,fault prediction and condition monitoring in the field of high-speed rail operation and maintenance.Digital twin technology is of great significance to improve the intelligent level of high-speed railway operation and management.Originality/value–This paper systematically summarizes the main components of digital twin railway.The general framework of the digital twin bridge is given,and its application in the field of intelligent operation and maintenance is prospected.
基金supported by National Natural Science Foundation of China(No.61101139)Natural Science Foundation of Fujian Province(Nos.2012J01244 and 2012J01243)Hunan Provincial Project of Science and Technology(No.2013FJ3090)
文摘Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that supports virtualization applications as well as load migration. Based on the existing technologies, the paper proposes a resource virtualization model (RVM) utilizing a hybrid-graph structure. The hybrid-graph structure can formally represent the critical entities such as private clouds, nodes within the private clouds, and resource including its type and quantity. It also provides a clear description of the logical relationship and the dynamic expansion among them as well. Moreover, based on the RVM, a resource converging algorithm and a maintaining algorithm of the resource pool which can timely reflect the dynamic variation of the private cloud and resource are presented. The algorithms collect resources and put them into the private cloud resource pools and global resource pools, and enable a real-time maintenance for the dynamic variation of resource to ensure the continuity and reliability. Both of the algorithms use a queue structure to accomplish functions of resource converging. Finally, a simulation platform of cloud computing is designed to test the algorithms proposed in the paper. The results show the correctness and the reliability of the algorithms.
基金Supported bythe National Basic Research Programof China (G1999035801)
文摘This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement.
基金This work has been supported by the Spanish Ministry of Science,Innovation and Universities,under the Ramon y Cajal Program(ref.RYC-2017-23823)and the projects PERSEIDES(ref.TIN2017-86885-R)and Go2Edge(ref.RED2018-102585-T)the European Commission,under the 5G-MOBIX(Grant No.825496)and IoTCrawler(Grant No.779852)projectsthe Spanish Ministry of Energy,through the project MECANO(ref.PGE-MOVESSING-2019-000104).
文摘The Internet of Moving Things(IoMT)takes a step further with respect to traditional static IoT deployments.In this line,the integration of new eco-friendly mobility devices such as scooters or bicycles within the Cooperative-Intelligent Transportation Systems(C-ITS)and smart city ecosystems is crucial to provide novel services.To this end,a range of communication technologies is available,such as cellular,vehicular WiFi or Low-Power Wide-Area Network(LPWAN);however,none of them can fully cover energy consumption and Quality of Service(QoS)requirements.Thus,we propose a Decision Support System(DSS),based on supervised Machine Learning(ML)classification,for selecting the most adequate transmission interface to send a certain message in a multi-Radio Access Technology(RAT)set up.Different ML algorithms have been explored taking into account computing and energy constraints of IoMT enddevices and traffic type.Besides,a real implementation of a decision tree-based DSS for micro-controller units is presented and evaluated.The attained results demonstrate the validity of the proposal,saving energy in communication tasks as well as satisfying QoS requirements of certain urgent messages.The footprint of the real implementation on an Arduino Uno is 444 bytes and it can be executed in around 50µs.
基金funded by the key project of the National Natural Science Foundation of China (No.61431001)the National High-Tech R&D Program (863 Program 2015AA01A705)New Technology Star Plan of Beijing (No.xx2013052)
文摘In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significantly improve the utilization efficiency of computing resources. In this paper,we study the computing resource allocation strategy for one VBS by considering the non-negligible effect of delay introduced by switches. Specifically,we formulate the VBS's sum computing rate maximization as a set optimization problem. To address this problem,we firstly propose a computing resource schedule algorithm,namely,weight before one-step-greedy(WBOSG),which has linear computation complexity and considerable performance. Then,OSG retreat(OSG-R) algorithm is developed to further improve the system performance at the expense of computational complexity. Simulation results under practical setting are provided to validate the proposed two algorithms.
文摘Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probability of offering interaction with the cloud.However,the fog computing characteristics are suscep-tible to counteract the challenges of security.The issues present with the Physical Layer Security(PLS)aspect in fog computing which included authentication,integrity,and confidentiality has been considered as a reason for the potential issues leading to the security breaches.In this work,the Octonion Algebra-inspired Non-Commutative Ring-based Fully Homomorphic Encryption Scheme(NCR-FHE)was proposed as a secrecy improvement technique to overcome the impersonation attack in cloud computing.The proposed approach was derived through the benefits of Octonion algebra to facilitate the maximum security for big data-based applications.The major issues in the physical layer security which may potentially lead to the possible security issues were identified.The potential issues causing the impersonation attack in the Fog computing environment were identified.The proposed approach was compared with the existing encryption approaches and claimed as a robust approach to identify the impersonation attack for the fog and edge network.The computation cost of the proposed NCR-FHE is identified to be significantly reduced by 7.18%,8.64%,9.42%,and 10.36%in terms of communication overhead for varying packet sizes,when compared to the benchmarked ECDH-DH,LHPPS,BF-PHE and SHE-PABF schemes.
文摘To solve the topology optimization of complicated multi-objective continuous/discrete design variables in aircmit structure design, a Parallel Pareto Genetic Algorithm (PPGA) is presented based on grid platform in this paper. In the algorithm, the commercial finite element analysis (FEA) software is integrated as the calculating tool for analyzing the objective functions and the filter of Pareto solution set based on weight information is introduced to deal with the relationships among all objectives. Grid technology is utilized in PPGA to realize the distributed computations and the user interface is developed to realize the job submission and job management locally/remotely. Taking the aero-elastic tailoring of a composite wing for optimization as an example, a set of Pareto solutions are obtained for the decision-maker. The numerical results show that the aileron reversal problem can be solved by adding the limited skin weight in this system. The algorithm can be used to solve complicated topology optimization for composite structures in engineering and the computation efficiency can be improved greatly by using the grid platform that aggregates numerous idle resources.
文摘The relationship between mankind and nature as well mankind and climate was introduced firstly, and then the necessity to remove negative value accompanying the improvement of humanized nature value was analyzed, finally the ways to insist on the unity of natural view and development view to realize the harmony between mankind and climate were proposed.
基金funded by the National Basic Research Program of China ("973" Program) under Grant No. 2007CB310805the National High Technology Research and Development Program of China ("863" Program) under Grant No. 2007AA12Z309
文摘Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This paper proposes an on-demand service system using the cloud computing architecture and analyzes important issues such as organization, management, and monitoring of distributed service resources; context-aware on-demand service modeling, on-demand automated service composition in large-scale networks, and service system analysis based on complex system theory. Continuous Operating Reference Station (CORS) of a geo-spatial information system is taken as an example, and its architecture is analyzed from the perspective of cloud computing. Some fundamental questions are raised about its service.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA1Z2070 ) and the National Natural Science Foundation of China (No. 90412013).
文摘Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.
文摘This work started out with the in-depth feasibil-ity study and limitation analysis on the current disease spread estimating and countermea-sures evaluating models, then we identify that the population variability is a crucial impact which has been always ignored or less empha-sized. Taking HIV/AIDS as the application and validation background, we propose a novel al-gorithm model system, EEA model system, a new way to estimate the spread situation, evaluate different countermeasures and analyze the development of ARV-resistant disease strains. The model is a series of solvable ordi-nary differential equation (ODE) models to es-timate the spread of HIV/AIDS infections, which not only require only one year’s data to deduce the situation in any year, but also apply the piecewise constant method to employ multi- year information at the same time. We simulate the effects of therapy and vaccine, then evaluate the difference between them, and offer the smallest proportion of the vaccination in the population to defeat HIV/AIDS, especially the advantage of using the vaccination while the deficiency of using therapy separately. Then we analyze the development of ARV-resistant dis-ease strains by the piecewise constant method. Last but not least, high performance computing (HPC) platform is applied to simulate the situa-tion with variable large scale areas divided by grids, and especially the acceleration rate will come to around 4 to 5.5.