期刊文献+
共找到69篇文章
< 1 2 4 >
每页显示 20 50 100
“虚拟化”时代下高职艺术设计专业实训教学管理平台构建研究 被引量:5
1
作者 张瑾 郦文俊 《传播力研究》 2019年第33期207-208,共2页
高职学校实训室承担着实训教学的重要任务,而高职院校中的艺术设计专业因为其自身专业的特殊性,对实训室软件与硬件的要求相对较高,这也决定了实训教学的管理方式和要求有别于其他专业的实训室。本文针对高职艺术设计类实训室在实训教... 高职学校实训室承担着实训教学的重要任务,而高职院校中的艺术设计专业因为其自身专业的特殊性,对实训室软件与硬件的要求相对较高,这也决定了实训教学的管理方式和要求有别于其他专业的实训室。本文针对高职艺术设计类实训室在实训教学方面存在的问题和困难,阐述采取"虚拟化"技术进行实训教学管理的必要性有优势,通过对现有实训教学条件的分析,提出在高职院校如何搭建一套完整的、便于操作的实训教学管理平台体系。 展开更多
关键词 “虚拟化” 高职艺术设计 实训教学管理平台
下载PDF
浅谈解立几探索题的“虚拟化”策略
2
作者 王建宏 《中学教研(数学版)》 2004年第1期13-15,共3页
在现实世界中,并不存在直线与平面,直线与平面都是虚拟的概念,它们是想象的产物.黑板、桌面、水面等都给我们以平面的形象,这种形象的概念,这些“没有”的东西,却在立体几何中起着基础的作用,它考察了同学们的空间想象能力,也给我们很... 在现实世界中,并不存在直线与平面,直线与平面都是虚拟的概念,它们是想象的产物.黑板、桌面、水面等都给我们以平面的形象,这种形象的概念,这些“没有”的东西,却在立体几何中起着基础的作用,它考察了同学们的空间想象能力,也给我们很多同学思考问题带来了一定的困难,而对立几的探索题,同学们更是“惧怕”.所谓“虚拟化”就是根据题目所给条件,借助想象,用虚拟与题设相同或相似的情境、虚拟几何模型,虚拟运动对象等,并以此作为研究对象,展示立几中较抽象的对象为具体可操作的对象,这种方法可以把复杂的过程分解为单一的过程,也可把抽象的问题转化为多个简单的问题,使复杂的问题简单化,从而收到避难而进的效果. 展开更多
关键词 立体几何 探索题 “虚拟化”策略 高中 数学 解题策略
下载PDF
银行业的“虚拟化”业务改革如何通过总部与分支机构之间的通信架构整合赢得竞争优势
3
作者 李邵建 《华南金融电脑》 2004年第7期9-11,共3页
一、挑战 在金融领域,许多企业为了扩展业务和提高赢利能力而日趋虚拟化与全球化,同时他们还不断通过降低成本、减少风险与增加收入来提升盈利底线和企业效益.通常,企业总部总是享有最新和最优秀的通信应用,而分支机构的员工则只能受制... 一、挑战 在金融领域,许多企业为了扩展业务和提高赢利能力而日趋虚拟化与全球化,同时他们还不断通过降低成本、减少风险与增加收入来提升盈利底线和企业效益.通常,企业总部总是享有最新和最优秀的通信应用,而分支机构的员工则只能受制于较陈旧的关键系统所提供的有限功能.而且,这些分支机构的关键系统分别来源于多家厂商,作为独立系统发挥其功效,各个分支机构之间或分支机构同总部之间的集成非常有限,甚至根本不存在集成. 展开更多
关键词 银行业 “虚拟化”业务 信息技术 互联网 金融机构
下载PDF
“1+X”证书制度下混合教学模式的开发实施——以“虚拟化技术”课程为例 被引量:3
4
作者 陈婷 刘海燕 《现代信息科技》 2020年第21期181-184,187,共5页
“1+X”证书制度是职业教育的重大改革举措,是职业教育改革的创新点,以北京信息职业技术学院“虚拟化技术”课程为例,围绕“1+X”证书制度的标准,利用信息化手段,从课程标准、课程内容、课程资源等方面探讨了基于“1+X”证书制度下混合... “1+X”证书制度是职业教育的重大改革举措,是职业教育改革的创新点,以北京信息职业技术学院“虚拟化技术”课程为例,围绕“1+X”证书制度的标准,利用信息化手段,从课程标准、课程内容、课程资源等方面探讨了基于“1+X”证书制度下混合教学模式的实施。“1+X”证书制度对职业院校培养学生的实践能力、提高学生的专业技能、增强学生就业的核心竞争力具有重大意义。 展开更多
关键词 “1+X”证书制度 “虚拟技术”课程 教学模式 课程资源
下载PDF
试析“网络民主”特征及其对民主政治发展的影响 被引量:45
5
作者 侯彬 《中共云南省委党校学报》 2005年第1期82-85,共4页
网络已成为具有广泛性的社会联系和交流媒介。由于网络中“电子人”其心理、思维、行为方式发生变异,使“网络民主”产生不同特征,从而对民主政治发展发生作用和影响。
关键词 网络民主 民主政治 社会联系 交流媒介 “虚拟化” 去权威 交互性
下载PDF
Design and implementation of a new special storage server
6
作者 韩德志 谢长生 +1 位作者 傅湘林 刘春 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期36-42,共7页
To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is ... To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is designed. The iNAS can provide both the file I/O and the block I/O services by an iSCSI module, and it converges with the NAS and the SAN (storage area network). The iNAS improves the I/O speed by the direct data access (zero copy) between the RAID (redundant array of inexpensive disks) controller and the user-level memory. The iNAS integrates the multi-RAID for a single storage pool by a multi-stage stripping device driver, and it implements the storage virtualization. In the experiments, the iNAS has ultra-high-throughput for both the file I/O requests and the block I/O requests. 展开更多
关键词 Input output programs INTERNET UNIX
下载PDF
Research on Visualization of Long-staple Cotton Growth in Southern Xinjiang
7
作者 司春景 席亚军 《Agricultural Science & Technology》 CAS 2011年第11期1738-1740,共3页
Base on the related researches at home and abroad, using systematic analysis principle mathematical modeling techniques, analysis model of organ collection properties, root structure model, mechanism model of spatial ... Base on the related researches at home and abroad, using systematic analysis principle mathematical modeling techniques, analysis model of organ collection properties, root structure model, mechanism model of spatial form of organs and dynamic model of plant topological structure in line with the growth of long-staple cotton are constructed, and three-dimensional dynamic simulation of long-staple cotton in southern Xinjiang is finally achieved. The system can promote people's understanding and perception on growth process of long-staple cotton in southern Xinjiang, which provides support for analysis of relationship between structure and function of long-staple cotton, design of ideal plant and regulation of growth model. 展开更多
关键词 Virtual growth VISUALIZATION FACTORS Topological structure
下载PDF
Survivable Virtual Network Mapping Using Optimal Backup Topology in Virtualized SDN 被引量:14
8
作者 WANG Zhiming WU Jiangxing WANG Yu QI Ning LAN Julong 《China Communications》 SCIE CSCD 2014年第2期26-37,共12页
Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks. However, for this hypervisor plane, how to map ... Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks. However, for this hypervisor plane, how to map a virtual network to the physical substrate while guaranteeing the survivability in the event of failures, is extremely important. In this paper, we present an efficient virtual network mapping approach using optimal backup topology to survive a single link failure with less resource consumption. Firstly, according to whether the path splitting is supported by virtual networks, we propose the OBT-I and OBT-II algorithms respectively to generate an optimal backup topology which minimizes the total amount of bandwidth constraints. Secondly, we propose a Virtual Network Mapping algorithm with coordinated Primary and Backup Topology (VNM-PBT) to make the best of the substrate network resource. The simulation experiments show that our proposed approach can reduce the average resource consumption and execution time cost, while improving the request acceptance ratio of VNs. 展开更多
关键词 software-defined network virtualnetwork mapping SURVIVABILITY optimalbackup topology path splitting backupsharing
下载PDF
Heuristic Solutions of Virtual Network Embedding: A Survey 被引量:15
9
作者 Haotong Cao Han Hu +1 位作者 Zhicheng Qu Longxiang Yang 《China Communications》 SCIE CSCD 2018年第3期186-219,共34页
Network virtualization(NV) is considered as an enabling tool to remove the gradual ossification of current Internet. In the network virtualization environment, a set of heterogeneous virtual networks(VNs), isolated fr... Network virtualization(NV) is considered as an enabling tool to remove the gradual ossification of current Internet. In the network virtualization environment, a set of heterogeneous virtual networks(VNs), isolated from each other, share the underlying resources of one or multiple substrate networks(SNs) according to the resource allocation strategy. This kind of resource allocation strategy is commonly known as so called Virtual Network Embedding(VNE) algorithm in network virtualization. Owing to the common sense that VNE problem is NP-hard in nature, most of VNE algorithms proposed in the literature are heuristic. This paper surveys and analyzes a number of representative heuristic solutions in the literature. Apart from the analysis of representative heuristic solutions, a taxonomy of the heuristic solutions is also presented in the form of table. Future research directions of VNE, especially for the heuristics, are emphasized and highlighted at the end of this survey. 展开更多
关键词 network virtualization virtual net-work embedding NP-HARD heuristic solution
下载PDF
Accelerating Packet Classification with Counting Bloom Filters for Virtual Open Flow Switching 被引量:4
10
作者 Jinyuan Zhao Zhigang Hu +1 位作者 Bing Xiong Keqin Li 《China Communications》 SCIE CSCD 2018年第10期117-128,共12页
The growing trend of network virtualization results in a widespread adoption of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet... The growing trend of network virtualization results in a widespread adoption of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet classification especially in Open Flow-based software defined networks. This paper first takes an insight into packet classification in virtual Open Flow switching, and points out that its performance bottleneck is dominated by flow table traversals of multiple failed mask probing for each arrived packet. Then we are motivated to propose an efficient packet classification algorithm based on counting bloom filters. In particular, counting bloom filters are applied to predict the failures of flow table lookups with great possibilities, and bypass flow table traversals for failed mask probing. Finally, our proposed packet classification algorithm is evaluated with real network traffic traces by experiments. The experimental results indicate that our proposed algorithm outperforms the classical one in Open v Switch in terms of average search length, and contributes to promote virtual Open Flow switching performance. 展开更多
关键词 OpenFlow virtual switching packet classification flow table lookups counting bloom filters
下载PDF
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
11
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources... As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources. This paper studies the service-ori- ented network virtualization architecture for loT services. Firstly the semantic description method for loT services is proposed, then the resource representation model and resource management model in the environment of network virtualization are presented. Based on the above models, the service-oriented virtual network architecture for loT is established. Finally, a smart campus system is designed and deployed based on the service-oriented virtual network architecture. Moreover, the proposed architecture and models are verified in experiments. 展开更多
关键词 Internet of Things network virtualization virtual network resource management virtual network embedding
下载PDF
Content Addressable Storage Optimization for Desktop Virtualization Based Disaster Backup Storage System 被引量:3
12
作者 Ruan Li Xiao Lim in Zhu Mingfa 《China Communications》 SCIE CSCD 2012年第7期1-13,共13页
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage 展开更多
关键词 disaster backup desktop virtualization storage optimization content addressable storage
下载PDF
"Smart Cafe": A Mobile Local Computing System Based On Indoor Virtual Cloud 被引量:2
13
作者 PU Lingjun XU Jingdong YU Bowen ZHANG Jianzhong 《China Communications》 SCIE CSCD 2014年第4期38-49,共12页
With network developing and virtualization rising, more and more indoor environment (POIs) such as care, library, office, even bus and subway can provide plenty of bandwidth and computing resources. Meanwhile many p... With network developing and virtualization rising, more and more indoor environment (POIs) such as care, library, office, even bus and subway can provide plenty of bandwidth and computing resources. Meanwhile many people daily spending much time in them are still suffering from the mobile device with limited resources. This situation implies a novel local cloud computing paradigm in which mobile device can leverage nearby resources to facilitate task execution. In this paper, we implement a mobile local computing system based on indoor virtual cloud. This system mainly contains three key components: 1)As to application, we create a parser to generate the "method call and cost tree" and analyze it to identify resource- intensive methods. 2) As to mobile device, we design a self-learning execution controller to make offtoading decision at runtime. 3) As to cloud, we construct a social scheduling based application-isolation virtual cloud model. The evaluation results demonstrate that our system is effective and efficient by evaluating CPU- intensive calculation application, Memory- intensive image translation application and I/ O-intensive image downloading application. 展开更多
关键词 mobile local computing system application partition dynamic offloading strategy virtual cloud model social scheduling
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
14
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
A movement-assisted software-defined sensor network with NFV support 被引量:2
15
作者 Yin Haohao Ding Cui +2 位作者 Yan Feng Xia Weiwei Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2018年第2期156-165,共10页
A flexible and controllable movement-assisted software-defined sensor network(MA-SDSN)based on the software-defined network(SDN)and network function virtualization(NFV)is proposed.First,a three-layer fundamental archi... A flexible and controllable movement-assisted software-defined sensor network(MA-SDSN)based on the software-defined network(SDN)and network function virtualization(NFV)is proposed.First,a three-layer fundamental architecture is proposed to overcome the inherent distributed management and rigidity of the conventional wireless sensor networks.Furthermore,the platform for research and development of MA-SDSN is established,and the dumb node(DN),the software-defined node(SN)and the movement-assisted node(MN)are designed and implemented.Then,the southbound application programming interface(API)is designed to provide a series of frames for communication between controllers and sensor nodes.The northbound API is developed and demonstrated overall and in detail.The functions of the controller are presented including topology discovery,dynamic networking,packet processing,mobility management and virtualization.Followed by the MA-SDSN network model,a Markov chain-based movement-assisted weighted relocation(MMWR)topology control algorithm is proposed to redeploy the MNs based on the node status and weight.Simulation results and analysis indicate that the proposed algorithm based on the MA-SDSN extends network lifetime with a lower average power consumption. 展开更多
关键词 software-defined sensor network network function virtualization movement-assisted topology control
下载PDF
Green Networking Based Energy Efficient Communications 被引量:2
16
作者 Wang Wennai Mi Zhengkun Wang Bin 《China Communications》 SCIE CSCD 2012年第2期22-30,共9页
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduc... The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is provided.Finally,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications. 展开更多
关键词 energy efficient communications greennetworking network virtualization green of Infor-mation and Communications Technology (ICT)
下载PDF
Dynamic Integrity Measurement Model Based on vTPM 被引量:2
17
作者 Ruizhong Du Wangyang Pan Junfeng Tian 《China Communications》 SCIE CSCD 2018年第2期88-99,共12页
With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has bec... With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has become an urgent problem. Some of the existing virtualization platform integrity measurement mechanism introduces the trusted computing technology, according to a trusted chain that the Trusted Platform Module(TPM) established for trusted root to measure the integrity of process in static. But this single chain static measurement cannot ensure the dynamic credible in platform running. To solve the problem that the virtual trusted platform can not guarantee the dynamic credibility, this paper put forward Dynamic Integrity Measurement Model(DIMM) based on virtual Trusted Platform Module(v TPM) which had been implemented with typical virtual machine monitor Xen as an example. DIMM combined with virtual machine introspection and event capture technology to ensure the security of the entire user domain. Based on the framework, this paper put forward Self-modify dynamic measurement strategy which can effectively reduce the measurement frequency and improve the measurement performance. Finally, it is proved that the validity and feasibility of the proposed model with comparison experiments. 展开更多
关键词 XEN trusted chain integrity mea-surement Self-modify measurement strategy dynamic integrity
下载PDF
A 5G Virtualized RAN Based on NO Stack 被引量:2
18
作者 Jie Zeng Xin Su +2 位作者 Jinjin Gong Liping Rong Jing Wang 《China Communications》 SCIE CSCD 2017年第6期199-208,共10页
The virtualized radio access network(v RAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network(RAN) significantly.In this paper,a... The virtualized radio access network(v RAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network(RAN) significantly.In this paper,a Not Only Stack(NO Stack) based vR AN is proposed to be employed in the fifth generation(5G) mobile communication system.It adopts advanced virtualization technologies to maintain flexible and sustainable.The baseband processing and storage resources should be sliced and orchestrated agilely to support multi radio access technology(multiRAT) .Also it is analyzed and demonstrated by different use cases to validate the benefits.The proposed v RAN reduces signaling overheads and service response time in the bearer establishment procedure.Concluded from the analyses and demonstrations,the NO Stack based v RAN could support multi-RAT convergence and flexible networking effectively. 展开更多
关键词 NO Stack virtualized radio access network radio access network slice network virtualization
下载PDF
Network Virtualization Based Seamless Networking Scheme for Fiber-Wireless (FiWi) Networks 被引量:3
19
作者 DAI Qinglong ZOU Jianfeng SHOU Guochu HU Yihong GUO Zhigang 《China Communications》 SCIE CSCD 2014年第5期1-16,共16页
In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a... In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance. 展开更多
关键词 fiber-wireless networks network virtualization service future network
下载PDF
Service Function Chain Orchestration across Multiple Clouds 被引量:1
20
作者 Xuxia Zhong Ying Wang Xuesong Qiu 《China Communications》 SCIE CSCD 2018年第10期99-116,共18页
Network function virtualization is a new network concept that moves network functions from dedicated hardware to software-defined applications running on standard high volume severs. In order to accomplish network ser... Network function virtualization is a new network concept that moves network functions from dedicated hardware to software-defined applications running on standard high volume severs. In order to accomplish network services, traffic flows are usually processed by a list of network functions in sequence which is defined by service function chain. By incorporating network function virtualization in inter-data center(DC) network, we can use the network resources intelligently and deploy network services faster. However, orchestrating service function chains across multiple data centers will incur high deployment cost, including the inter-data center bandwidth cost, virtual network function cost and the intra-data center bandwidth cost. In this paper, we orchestrate SFCs across multiple data centers, with a goal to minimize the overall cost. An integer linear programming(ILP) model is formulated and we provide a meta-heuristic algorithm named GBAO which contains three modules to solve it. We implemented our algorithm in Python and performed side-by-side comparison with prior algorithms. Simulation results show that our proposed algorithm reduces the overall cost by at least 21.4% over the existing algorithms for accommodating the same service function chain requests. 展开更多
关键词 network function virtualization service function chain orchestration inter-DC network
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部