期刊文献+
共找到81篇文章
< 1 2 5 >
每页显示 20 50 100
A Service Level Agreement Aware Online Algorithm for Virtual Machine Migration
1
作者 Iftikhar Ahmad Ambreen Shahnaz +2 位作者 Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano 《Computers, Materials & Continua》 SCIE EI 2023年第1期279-291,共13页
The demand for cloud computing has increased manifold in the recent past.More specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computi... The demand for cloud computing has increased manifold in the recent past.More specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs.The cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple VirtualMachines.Each virtualmachine potentially represents a different user environment such as operating system,programming environment,and applications.However,these cloud services use a large amount of electrical energy and produce greenhouse gases.To reduce the electricity cost and greenhouse gases,energy efficient algorithms must be designed.One specific area where energy efficient algorithms are required is virtual machine consolidation.With virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement requirements.This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host.The online algorithm is analyzed using a competitive analysis approach.In addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms.Our proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms. 展开更多
关键词 Cloud computing green computing online algorithms virtual machine migration
下载PDF
Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization
2
作者 Prohim Tam Sa Math Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2141-2154,共14页
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control... Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge softwarization.To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth capacities.Adaptive partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop ratio.The optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation steps.The reward formulation primarily considers taskrequired computing resources and action-applied allocation properties.With defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated properties.The simulation for the control rule installation is conducted using Mininet and Ryu SDN controller.Average delay and task delivery/drop ratios are used as the key performance metrics. 展开更多
关键词 Deep learning partial task offloading software-defined networking virtual machine virtual network functions
下载PDF
Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines
3
作者 N.Jagadeeswari V.Mohan Raj 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期929-943,共15页
Virtualization is the backbone of cloud computing,which is a developing and widely used paradigm.Byfinding and merging identical memory pages,memory deduplication improves memory efficiency in virtualized systems.Kern... Virtualization is the backbone of cloud computing,which is a developing and widely used paradigm.Byfinding and merging identical memory pages,memory deduplication improves memory efficiency in virtualized systems.Kernel Same Page Merging(KSM)is a Linux service for memory pages sharing in virtualized environments.Memory deduplication is vulnerable to a memory disclosure attack,which uses covert channel establishment to reveal the contents of other colocated virtual machines.To avoid a memory disclosure attack,sharing of identical pages within a single user’s virtual machine is permitted,but sharing of contents between different users is forbidden.In our proposed approach,virtual machines with similar operating systems of active domains in a node are recognised and organised into a homogenous batch,with memory deduplication performed inside that batch,to improve the memory pages sharing efficiency.When compared to memory deduplication applied to the entire host,implementation details demonstrate a significant increase in the number of pages shared when memory deduplication applied batch-wise and CPU(Central processing unit)consumption also increased. 展开更多
关键词 Kernel same page merging memory deduplication virtual machine sharing content-based sharing
下载PDF
Hybrid Prairie Dog and Beluga Whale Optimization Algorithm for Multi-Objective Load Balanced-Task Scheduling in Cloud Computing Environments
4
作者 K Ramya Senthilselvi Ayothi 《China Communications》 SCIE CSCD 2024年第7期307-324,共18页
The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource pr... The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time. 展开更多
关键词 Beluga Whale Optimization Algorithm(BWOA) cloud computing Improved Hopcroft-Karp algorithm Infrastructure as a Service(IaaS) Prairie Dog Optimization Algorithm(PDOA) virtual Machine(VM)
下载PDF
Electromechanical Transient Modeling Analysis of Large-Scale New Energy Grid Connection
5
作者 Shichao Cao Yonggang Dong Xiaoying Liu 《Energy Engineering》 EI 2024年第4期1109-1125,共17页
The synchronous virtual machine uses inverter power to imitate the performance of the conventional synchronous machine.It also has the same inertia,damping,frequency,voltage regulation,and other external performance a... The synchronous virtual machine uses inverter power to imitate the performance of the conventional synchronous machine.It also has the same inertia,damping,frequency,voltage regulation,and other external performance as the generator.It is the key technology to realize new energy grid connections’stable and reliable operation.This project studies a dynamic simulation model of an extensive new energy power system based on the virtual synchronous motor.A new energy storage method is proposed.The mathematical energy storage model is established by combining the fixed rotor model of a synchronous virtual machine with the charge-discharge power,state of charge,operation efficiency,dead zone,and inverter constraint.The rapid conversion of energy storage devices absorbs the excess instantaneous kinetic energy caused by interference.The branch transient of the critical cut set in the system can be confined to a limited area.Thus,the virtual synchronizer’s kinetic and potential energy can be efficiently converted into an instantaneous state.The simulation of power system analysis software package(PSASP)verifies the correctness of the theory and algorithm in this paper.This paper provides a theoretical basis for improving the transient stability of new energy-connected power grids. 展开更多
关键词 New energy grid connection transient electromechanical modeling synchronous virtual machine PSASP software energy storage
下载PDF
Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing
6
作者 Umer Nauman Yuhong Zhang +1 位作者 Zhihui Li Tong Zhen 《Intelligent Automation & Soft Computing》 2024年第3期477-510,共34页
Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate des... Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets,such as preservation and server infrastructure,in a limited number of large-scale worldwide data facilities.Optimizing the deployment of virtual machines(VMs)is crucial in this scenario to ensure system dependability,performance,and minimal latency.A significant barrier in the present scenario is the load distribution,particularly when striving for improved energy consumption in a hypothetical grid computing framework.This design employs load-balancing techniques to allocate different user workloads across several virtual machines.To address this challenge,we propose using the twin-fold moth flame technique,which serves as a very effective optimization technique.Developers intentionally designed the twin-fold moth flame method to consider various restrictions,including energy efficiency,lifespan analysis,and resource expenditures.It provides a thorough approach to evaluating total costs in the cloud computing environment.When assessing the efficacy of our suggested strategy,the study will analyze significant metrics such as energy efficiency,lifespan analysis,and resource expenditures.This investigation aims to enhance cloud computing techniques by developing a new optimization algorithm that considers multiple factors for effective virtual machine placement and load balancing.The proposed work demonstrates notable improvements of 12.15%,10.68%,8.70%,13.29%,18.46%,and 33.39%for 40 count data of nodes using the artificial bee colony-bat algorithm,ant colony optimization,crow search algorithm,krill herd,whale optimization genetic algorithm,and improved Lévy-based whale optimization algorithm,respectively. 展开更多
关键词 Optimizing cloud computing deployment of virtual machines LOAD-BALANCING twin-fold moth flame algorithm grid computing computational resource distribution data virtualization
下载PDF
Event-driven process execution model for process virtual machine 被引量:3
7
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
下载PDF
XEN Virtual Machine Technology and Its Security Analysis 被引量:4
8
作者 XUE Haifeng QING Sihan ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期159-162,共4页
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The secur... This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future. 展开更多
关键词 virtual machine XEN SECURITY
下载PDF
Task scheduling and virtual machine allocation policy in cloud computing environment 被引量:3
9
作者 Xiong Fu Yeliang Cang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期847-856,共10页
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o... Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time. 展开更多
关键词 cloud computing resource allocation task scheduling virtual machine (VM) allocation.
下载PDF
Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing 被引量:2
10
作者 HUANG Qiang SHEN Changxiang FANG Yanxiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期13-16,共4页
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM... With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 展开更多
关键词 trusted computing virtual machine monitor(VMM) separation kernel trusted computing base (TCB)
下载PDF
Research on optimization of virtual machine memory access based on NUMA architecture 被引量:2
11
作者 何牧君 Zheng Linjiang +2 位作者 Yang Kai Liu Runfeng Liu Weining 《High Technology Letters》 EI CAS 2021年第4期347-356,共10页
With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-per... With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-performance computing,require enhanced computing power.To meet this requirement,a non-uniform memory access(NUMA)configuration method is proposed for the cloud computing system according to the affinity,adaptability,and availability of the NUMA architecture processor platform.The proposed method is verified based on the test environment of a domestic central processing unit(CPU). 展开更多
关键词 cloud computing virtualIZATION non-uniform memory access(NUMA)virtual machine memory access optimization
下载PDF
A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing 被引量:1
12
作者 Sohan Kumar Pande Sanjaya Kumar Panda +5 位作者 Satyabrata Das Kshira Sagar Sahoo Ashish Kr.Luhach N.Z.Jhanjhi Roobaea Alroobaea Sivakumar Sivanesan 《Computers, Materials & Continua》 SCIE EI 2021年第5期2647-2663,共17页
In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many ... In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many studies reported that some of these VMs hosted on the vehicles are overloaded,whereas others are underloaded.As a circumstance,the energy consumption of overloaded vehicles is drastically increased.On the other hand,underloaded vehicles are also drawing considerable energy in the underutilized situation.Therefore,minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in the VCC environment.The proper and efcient utilization of the vehicle’s resources can reduce energy consumption signicantly.One of the solutions is to improve the resource utilization of underloaded vehicles by migrating the over-utilized VMs of overloaded vehicles.On the other hand,a large number of VM migrations can lead to wastage of energy and time,which ultimately degrades the performance of the VMs.This paper addresses the issues mentioned above by introducing a resource management algorithm,called resource utilization-aware VM migration(RU-VMM)algorithm,to distribute the loads among the overloaded and underloaded vehicles,such that energy consumption is minimized.RU-VMM monitors the trend of resource utilization to select the source and destination vehicles within a predetermined threshold for the process of VM migration.It ensures that any vehicles’resource utilization should not exceed the threshold before or after the migration.RU-VMM also tries to avoid unnecessary VM migrations between the vehicles.RU-VMM is extensively simulated and tested using nine datasets.The results are carried out using three performance metrics,namely number of nal source vehicles(nfsv),percentage of successful VM migrations(psvmm)and percentage of dropped VM migrations(pdvmm),and compared with threshold-based algorithm(i.e.,threshold)and cumulative sum(CUSUM)algorithm.The comparisons show that the RU-VMM algorithm performs better than the existing algorithms.RU-VMM algorithm improves 16.91%than the CUSUM algorithm and 71.59%than the threshold algorithm in terms of nfsv,and 20.62%and 275.34%than the CUSUM and threshold algorithms in terms of psvmm. 展开更多
关键词 Resource management virtual machine migration vehicular cloud computing resource utilization source vehicle destination vehicle
下载PDF
Virtual Machine软件在火力发电厂控制系统及课件培训中的应用 被引量:1
13
作者 万首辉 《中小企业管理与科技》 2021年第9期186-187,共2页
论文就Virtual Machine软件在火力发电厂Windows XP控制系统中应用遇到的问题进行了论述,并针对问题提出了相应的措施及方案,以期为Virtual Machine软件在更多领域中应用提供参考资料。
关键词 virtual Machine软件 火力发电厂 控制系统 应用
下载PDF
Multiple attacks on virtualization-based security monitoring
14
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 virtualIZATION VULNERABILITY attack method security threat virtual machine monitor
下载PDF
A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter
15
作者 Changming Zhao Tiejun Wang Alan Yang 《Computers, Materials & Continua》 SCIE EI 2019年第7期423-437,共15页
In the paper,we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment.In general,the different slices for different task scenari... In the paper,we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment.In general,the different slices for different task scenarios exist in the same edge layer synchronously.A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity.In the condition,the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment.Based on the slicing and container concept,we propose the resource allocation scheme named Two-Dimension allocation and correlation placement Scheme(TDACP).The scheme divides the resource allocation and management work into three stages in this paper:In the first stage,it designs reasonably strategy to allocate resources to different task slices according to demand.In the second stage,it establishes an equivalent relationship between the virtual machine reserved resource capacity and the Service-Level Agreement(SLA)of the virtual machine in different slices.In the third stage,it designs a placement optimization strategy to schedule the equivalent virtual machines in the physical servers.Thus,it is able to establish a virtual machine placement strategy with high resource utilization efficiency and low time cost.The simulation results indicate that the proposed scheme is able to suppress the problem of uneven resource allocation which is caused by the pure preemptive scheduling strategy.It adjusts the number of equivalent virtual machines based on the SLA range of system parameter,and reduces the SLA probability of physical servers effectively based on resource utilization time sampling series linear.The scheme is able to guarantee resource allocation and management work orderly and efficiently in the edge datacenter slices. 展开更多
关键词 Heterogeneous virtual machine resource allocation edge computing SLICING
下载PDF
An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model
16
作者 C.Saravanakumar R.Priscilla +3 位作者 B.Prabha A.Kavitha M.Prakash C.Arun 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期245-256,共12页
Cloud Computing provides various services to the customer in aflex-ible and reliable manner.Virtual Machines(VM)are created from physical resources of the data center for handling huge number of requests as a task.Thes... Cloud Computing provides various services to the customer in aflex-ible and reliable manner.Virtual Machines(VM)are created from physical resources of the data center for handling huge number of requests as a task.These tasks are executed in the VM at the data center which needs excess hosts for satis-fying the customer request.The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time.This process is carried out based on various algorithms which follow a pre-defined capacity of source VM leads to the capacity issue at the destination VM.The proposed VM migration technique performs the migration process based on the request of the requesting host machine.This technique can perform in three ways namely single VM migration,Multiple VM migration and Cluster VM migration.Common Deployment Manager(CDM)is used to support through negotiation that happens across the source host and destination host for providing the high quality service to their customer.The VM migration requests are handled with an exposure of the source host capabilities.The proposed analysis also uses the retired instructions with execution by the hypervisor to achieve high reliabil-ity.The objective of the proposed technique is to perform a VM migration process based on the prior knowledge of the resource availability in the target VM. 展开更多
关键词 Cloud computing virtualIZATION HYPERVISOR VMmigration virtual machine
下载PDF
Optimal Load Balancing in Cloud Environment of Virtual Machines
17
作者 Fuad A.M.Al-Yarimi Sami Althahabi Majdy Mohammed Eltayeb 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期919-932,共14页
Cloud resource scheduling is gaining prominence with the increasingtrends of reliance on cloud infrastructure solutions. Numerous sets of cloudresource scheduling models were evident in the literature. Cloud resource ... Cloud resource scheduling is gaining prominence with the increasingtrends of reliance on cloud infrastructure solutions. Numerous sets of cloudresource scheduling models were evident in the literature. Cloud resource scheduling refers to the distinct set of algorithms or programs the service providersengage to maintain the service level allocation for various resources over a virtualenvironment. The model proposed in this manuscript schedules resources of virtual machines under potential volatility aspects, which can be applied for anypriority metric chosen by the server administrators. Also, the model can be flexible for any time frame-based analysis of the load factor. The model discussed inthis manuscript relies on the Bollinger Bands tool for understanding the potentialvolatility aspects of a Virtual Machine. The experimental study of the model compared to the contemporary load balancing model called STLB (Starvation Threshold-based Load Balancing) refers to a simple and potential model that can bemore pragmatic for sustainable ways of load balancing. 展开更多
关键词 Cloud computing service level agreements virtual machines load balancing SCHEDULING
下载PDF
A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration
18
作者 Denghui Zhang Guocai Yin 《Journal on Internet of Things》 2021年第4期149-157,共9页
Cloud data centers face the largest energy consumption.In order to save energy consumption in cloud data centers,cloud service providers adopt a virtual machine migration strategy.In this paper,we propose an efficient... Cloud data centers face the largest energy consumption.In order to save energy consumption in cloud data centers,cloud service providers adopt a virtual machine migration strategy.In this paper,we propose an efficient virtual machine placement strategy(VMP-SI)based on virtual machine selection and integration.Our proposed VMP-SI strategy divides the migration process into three phases:physical host state detection,virtual machine selection and virtual machine placement.The local regression robust(LRR)algorithm and minimum migration time(MMT)policy are individual used in the first and section phase,respectively.Then we design a virtual machine migration strategy that integrates the process of virtual machine selection and placement,which can ensure a satisfactory utilization efficiency of the hardware resources of the active physical host.Experimental results show that our proposed method is better than the approach in Cloudsim under various performance metrics. 展开更多
关键词 Cloud data centers virtual machine selection virtual machine placement MIGRATION energy consumption
下载PDF
WEB-BASED VIRTUAL CNC MACHINE MODELING AND OPERATION
19
作者 HE Hanwu WU Yueming GU Yaoda LU Yongming 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第6期109-113,共5页
A CNC simulation system based on intemet for operation training of manufacturing facility and manufacturing process simulation is proposed. Firstly, the system framework and a rapid modeling method of CNC machine tool... A CNC simulation system based on intemet for operation training of manufacturing facility and manufacturing process simulation is proposed. Firstly, the system framework and a rapid modeling method of CNC machine tool are studied under the virtual environment based on PolyTrans and CAD software. Then, a new method is proposed to enhance and expand the interactive ability of virtual reality modeling language(VRML) by attaining communication among VRML, JavaApplet, JavaScript and Html so as to realize the virtual operation for CNC machine tool. Moreover, the algorithm of material removed simulation based on VRML Z-map is presented. The advantages of this algorithm include less memory requirement and much higher computation. Lastly, the CNC milling machine is taken as an illustrative example for the prototype development in order to validate the feasibility of the proposed approach. 展开更多
关键词 virtual reality CNC machine tools machining simulation virtual reality modeling language (VRML) virtual operation
下载PDF
DRIVE AND CONTROL OF VIRTUAL-AXIS NC MACHINE TOOLS
20
作者 Zhou, Kai Wang, Baichuan 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 1999年第2期27-32,共6页
The structure features and driving modes of virtual axis NC machine tools are studied. Accor ding to different application requirements,the three axis control method,the five axis control method and the sixfre... The structure features and driving modes of virtual axis NC machine tools are studied. Accor ding to different application requirements,the three axis control method,the five axis control method and the sixfreedom control method are put forward.These results lay a foundation for the product development of the virtual axis NC machine tools 展开更多
关键词 virtual axis machine tool Structure Driving Control
全文增补中
上一页 1 2 5 下一页 到第
使用帮助 返回顶部