With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-per...With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-performance computing,require enhanced computing power.To meet this requirement,a non-uniform memory access(NUMA)configuration method is proposed for the cloud computing system according to the affinity,adaptability,and availability of the NUMA architecture processor platform.The proposed method is verified based on the test environment of a domestic central processing unit(CPU).展开更多
Virtualization is the backbone of cloud computing,which is a developing and widely used paradigm.Byfinding and merging identical memory pages,memory deduplication improves memory efficiency in virtualized systems.Kern...Virtualization is the backbone of cloud computing,which is a developing and widely used paradigm.Byfinding and merging identical memory pages,memory deduplication improves memory efficiency in virtualized systems.Kernel Same Page Merging(KSM)is a Linux service for memory pages sharing in virtualized environments.Memory deduplication is vulnerable to a memory disclosure attack,which uses covert channel establishment to reveal the contents of other colocated virtual machines.To avoid a memory disclosure attack,sharing of identical pages within a single user’s virtual machine is permitted,but sharing of contents between different users is forbidden.In our proposed approach,virtual machines with similar operating systems of active domains in a node are recognised and organised into a homogenous batch,with memory deduplication performed inside that batch,to improve the memory pages sharing efficiency.When compared to memory deduplication applied to the entire host,implementation details demonstrate a significant increase in the number of pages shared when memory deduplication applied batch-wise and CPU(Central processing unit)consumption also increased.展开更多
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM...With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.展开更多
As wind is the basis of all wind energy projects, a precise knowledge about its availability is needed. For ananalysis of the site-specific wind conditions, Virtual Meteorological Masts (VMMs) are frequently used. VMM...As wind is the basis of all wind energy projects, a precise knowledge about its availability is needed. For ananalysis of the site-specific wind conditions, Virtual Meteorological Masts (VMMs) are frequently used. VMMsmake use of site calibrated numerical data to provide precise wind estimates during all phases of a wind energyproject. Typically, numerical data are used for the long-term correlation that is required for estimating theyield of new wind farm projects. However, VMMs can also be used to fill data gaps or during the operationalphase as an additional reference data set to detect degrading sensors. The value of a VMM directly dependson its ability and precision to reproduce site-specific environmental conditions. Commonly, linear regressionis used as state of the art to correct reference data to the site-specific conditions. In this study, a frameworkof 10 different machine-learning methods is tested to investigated the benefit of more advanced methods ontwo offshore and one onshore site. We find significantly improving correlations between the VMMs and the reference data when using more advanced methods and present the most promising ones. The K-NearestNeighbors and AdaBoost regressors show the best results in our study, but Multi-Output Mixture of GaussianProcesses is also very promising. The use of more advanced regression models lead to decreased uncertainties;hence those methods should find its way into industrial applications. The recommended regression models canserve as a starting point for the development of end-user applications and services.展开更多
基金the National Key Research and Development Program of China(No.2017YFC0212100)National High-tech R&D Program of China(No.2015AA015308).
文摘With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-performance computing,require enhanced computing power.To meet this requirement,a non-uniform memory access(NUMA)configuration method is proposed for the cloud computing system according to the affinity,adaptability,and availability of the NUMA architecture processor platform.The proposed method is verified based on the test environment of a domestic central processing unit(CPU).
文摘Virtualization is the backbone of cloud computing,which is a developing and widely used paradigm.Byfinding and merging identical memory pages,memory deduplication improves memory efficiency in virtualized systems.Kernel Same Page Merging(KSM)is a Linux service for memory pages sharing in virtualized environments.Memory deduplication is vulnerable to a memory disclosure attack,which uses covert channel establishment to reveal the contents of other colocated virtual machines.To avoid a memory disclosure attack,sharing of identical pages within a single user’s virtual machine is permitted,but sharing of contents between different users is forbidden.In our proposed approach,virtual machines with similar operating systems of active domains in a node are recognised and organised into a homogenous batch,with memory deduplication performed inside that batch,to improve the memory pages sharing efficiency.When compared to memory deduplication applied to the entire host,implementation details demonstrate a significant increase in the number of pages shared when memory deduplication applied batch-wise and CPU(Central processing unit)consumption also increased.
基金Supported by the National Program on Key Basic Re-search Project of China (G1999035801)
文摘With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
基金ts Digitale Windboje(FKZ 03EE3024)and“ADWENTURE”(FKZ 03EE2030)funded by the German Federal Ministry for Economic Affairs and Climate Action(BMWK)Other parts were funded by the BMBF project“MADESI”(FKZ 01IS18043B)+2 种基金by the Competence Center for AI and Labour(“kompAKI”,FKZ 02L19C150)The project also benefited from the Hessian Ministry of Higher Education,Research,Science and the Arts(HMWK)project“The Third Wave of AI”.The WRF simulations were performed on the HPC Cluster EDDY,located at the University of Oldenburg(Germany)and were funded by BMWK(FKZ 0324005)We would like to thank the Federal Maritime and Hydrographic Agency(BSH)for providing the met mast data of FINO2 and FINO3,and Engie SA for the SCADA data of R80736.Also we would like to acknowledge ECMWF for providing ERA5 data.
文摘As wind is the basis of all wind energy projects, a precise knowledge about its availability is needed. For ananalysis of the site-specific wind conditions, Virtual Meteorological Masts (VMMs) are frequently used. VMMsmake use of site calibrated numerical data to provide precise wind estimates during all phases of a wind energyproject. Typically, numerical data are used for the long-term correlation that is required for estimating theyield of new wind farm projects. However, VMMs can also be used to fill data gaps or during the operationalphase as an additional reference data set to detect degrading sensors. The value of a VMM directly dependson its ability and precision to reproduce site-specific environmental conditions. Commonly, linear regressionis used as state of the art to correct reference data to the site-specific conditions. In this study, a frameworkof 10 different machine-learning methods is tested to investigated the benefit of more advanced methods ontwo offshore and one onshore site. We find significantly improving correlations between the VMMs and the reference data when using more advanced methods and present the most promising ones. The K-NearestNeighbors and AdaBoost regressors show the best results in our study, but Multi-Output Mixture of GaussianProcesses is also very promising. The use of more advanced regression models lead to decreased uncertainties;hence those methods should find its way into industrial applications. The recommended regression models canserve as a starting point for the development of end-user applications and services.