As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in...As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible.展开更多
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h...Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.展开更多
Ambient Assisted Living(AAL) is becoming an important research field. Many technologies have emerged related with pervasive computing vision, which can give support for AAL. One of the most reliable approaches is base...Ambient Assisted Living(AAL) is becoming an important research field. Many technologies have emerged related with pervasive computing vision, which can give support for AAL. One of the most reliable approaches is based on wireless sensor networks(WSNs). In this paper, we propose a coverage-aware unequal clustering protocol with load separation(CUCPLS) for data gathering of AAL applications based on WSNs. Firstly, the coverage overlap factor for nodes is introduced that accounts for the degree of target nodes covered. In addition, to balance the intra-cluster and inter-cluster energy consumptions, different competition radiuses of CHs are computed theoretically in different rings, and smaller clusters are formed near the sink. Moreover, two CHs are selected in each cluster for load separation to alleviate the substantial energy consumption difference between a single CH and its member nodes. Furthermore, a backoff waiting time is adopted during the selection of the two CHs to reduce the number of control messages employed. Simulation results demonstrate that the CUCPLS not only can achieve better coverage performance, but also balance the energy consumption of a network and prolong network lifetime.展开更多
IT infrastructures have been widely deployed in datacentres by cloud service providers for Infrastructure as a Service (IaaS) with Virtual Machines (VMs). With the rapid development of cloud-based tools and techniques...IT infrastructures have been widely deployed in datacentres by cloud service providers for Infrastructure as a Service (IaaS) with Virtual Machines (VMs). With the rapid development of cloud-based tools and techniques, IaaS is changing the current cloud infrastructure to meet the customer demand. In this paper, an efficient management model is presented and evaluated using our unique Trans-Atlantic high-speed optical fibre network connecting three datacentres located in Coleraine (Northern Ireland), Dublin (Ireland) and Halifax (Canada). Our work highlights the design and implementation of a management system that can dynamically create VMs upon request, process live migration and other services over the high-speed inter-networking Datacentres (DCs). The goal is to provide an efficient and intelligent on-demand management system for virtualization that can make decisions about the migration of VMs and get better utilisation of the network.展开更多
现有跨域人脸活体检测算法,其特征提取过程容易发生过拟合和缺乏特征聚合所导致的泛化性不足问题。针对该问题,提出了跨域人脸活体检测的单边对抗网络算法,将分组卷积与改进的倒残差结构融合替换普通卷积,降低网络参数同时加强人脸细粒...现有跨域人脸活体检测算法,其特征提取过程容易发生过拟合和缺乏特征聚合所导致的泛化性不足问题。针对该问题,提出了跨域人脸活体检测的单边对抗网络算法,将分组卷积与改进的倒残差结构融合替换普通卷积,降低网络参数同时加强人脸细粒度特征的表达能力,并引入自适应特征归一化模块,强调图像中人脸活体信息区域淡化无关背景区域,有效避免人脸活体信息的过拟合并加强来自不同源域的人脸活体检测能力。基于NetVLAD引入通道注意力机制模块,通道注意力机制模块作为特征聚合网络的分支,学习不同源域中人脸局部特征的语义信息,有效增强对不同源域的人脸活体信息分类的泛化能力。设计两模块融合网络以提高未知场景下跨域人脸活体检测精度。在OULU-NPU、CASIA-FASD、MSU-MFSD和Idiap Replay-Attack数据集上的实验结果表明,该算法在跨数据集测试O&C&M to I、O&C&I to M、I&C&M to O、O&M&I to C均有不错的表现,其中,在O&C&I to M及O&M&I to C性能评估指标分别提升了0.99个百分点和0.5个百分点的精度。展开更多
Network topology inference is one of the important applications of network tomography.Traditional network topology inference may impact network normal operation due to its generation of huge data traffic.A unicast net...Network topology inference is one of the important applications of network tomography.Traditional network topology inference may impact network normal operation due to its generation of huge data traffic.A unicast network topology inference is proposed to use time to live(TTL)for layering and classify nodes layer by layer based on the similarity of node pairs.Finally,the method infers logical network topology effectively with self-adaptive combination of previous results.Simulation results show that the proposed method holds a high accuracy of topology inference while decreasing network measuring flow,thus improves measurement efficiency.展开更多
Magnetic resonance imaging is a highly sensitive approach for diagnosis of multiple sclerosis, and T2-weighted images can reveal lesions in the cerebral white matter, gray matter, and spinal cord. However, the lesions...Magnetic resonance imaging is a highly sensitive approach for diagnosis of multiple sclerosis, and T2-weighted images can reveal lesions in the cerebral white matter, gray matter, and spinal cord. However, the lesions have a poor correlation with measurable clinical disability. In this study, we performed a large-scale epidemiological survey of 238 patients with multiple sclerosis in eleven districts by network member hospitals in Shanghai, China within 1 year. The involved patients were scanned for position and size of lesions by MRI. Results showed that lesions in the cerebrum, spina cord, or supratentorial position had an impact on the activities of daily living in multiple sclerosis patients, as assessed by the Bayes network. On the other hand, brainstem lesions were very unlikely to influence the activities of daily living, and were not associated with the position of lesion, patient's gender, and patient's living place.展开更多
基金supported by State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2009ZX-02China Aviation Science Fund under Grant No.20081951National High Technical Research and Development Program of China (863 Program) under Grant No.2007AA01Z183
文摘As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible.
基金Project (Nos. 60502014 and 60432030) supported by the National Natural Science Foundation of China
文摘Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.
基金supported by the National Nature Science Foundation of China (61170169, 61170168)
文摘Ambient Assisted Living(AAL) is becoming an important research field. Many technologies have emerged related with pervasive computing vision, which can give support for AAL. One of the most reliable approaches is based on wireless sensor networks(WSNs). In this paper, we propose a coverage-aware unequal clustering protocol with load separation(CUCPLS) for data gathering of AAL applications based on WSNs. Firstly, the coverage overlap factor for nodes is introduced that accounts for the degree of target nodes covered. In addition, to balance the intra-cluster and inter-cluster energy consumptions, different competition radiuses of CHs are computed theoretically in different rings, and smaller clusters are formed near the sink. Moreover, two CHs are selected in each cluster for load separation to alleviate the substantial energy consumption difference between a single CH and its member nodes. Furthermore, a backoff waiting time is adopted during the selection of the two CHs to reduce the number of control messages employed. Simulation results demonstrate that the CUCPLS not only can achieve better coverage performance, but also balance the energy consumption of a network and prolong network lifetime.
文摘IT infrastructures have been widely deployed in datacentres by cloud service providers for Infrastructure as a Service (IaaS) with Virtual Machines (VMs). With the rapid development of cloud-based tools and techniques, IaaS is changing the current cloud infrastructure to meet the customer demand. In this paper, an efficient management model is presented and evaluated using our unique Trans-Atlantic high-speed optical fibre network connecting three datacentres located in Coleraine (Northern Ireland), Dublin (Ireland) and Halifax (Canada). Our work highlights the design and implementation of a management system that can dynamically create VMs upon request, process live migration and other services over the high-speed inter-networking Datacentres (DCs). The goal is to provide an efficient and intelligent on-demand management system for virtualization that can make decisions about the migration of VMs and get better utilisation of the network.
文摘现有跨域人脸活体检测算法,其特征提取过程容易发生过拟合和缺乏特征聚合所导致的泛化性不足问题。针对该问题,提出了跨域人脸活体检测的单边对抗网络算法,将分组卷积与改进的倒残差结构融合替换普通卷积,降低网络参数同时加强人脸细粒度特征的表达能力,并引入自适应特征归一化模块,强调图像中人脸活体信息区域淡化无关背景区域,有效避免人脸活体信息的过拟合并加强来自不同源域的人脸活体检测能力。基于NetVLAD引入通道注意力机制模块,通道注意力机制模块作为特征聚合网络的分支,学习不同源域中人脸局部特征的语义信息,有效增强对不同源域的人脸活体信息分类的泛化能力。设计两模块融合网络以提高未知场景下跨域人脸活体检测精度。在OULU-NPU、CASIA-FASD、MSU-MFSD和Idiap Replay-Attack数据集上的实验结果表明,该算法在跨数据集测试O&C&M to I、O&C&I to M、I&C&M to O、O&M&I to C均有不错的表现,其中,在O&C&I to M及O&M&I to C性能评估指标分别提升了0.99个百分点和0.5个百分点的精度。
基金supported by the National Natural Science Foundation of China (Nos.61373137,61373017, 61373139)the Major Program of Jiangsu Higher Education Institutions (No.14KJA520002)+1 种基金the Six Industries Talent Peaks Plan of Jiangsu(No.2013-DZXX-014)the Jiangsu Qinglan Project
文摘Network topology inference is one of the important applications of network tomography.Traditional network topology inference may impact network normal operation due to its generation of huge data traffic.A unicast network topology inference is proposed to use time to live(TTL)for layering and classify nodes layer by layer based on the similarity of node pairs.Finally,the method infers logical network topology effectively with self-adaptive combination of previous results.Simulation results show that the proposed method holds a high accuracy of topology inference while decreasing network measuring flow,thus improves measurement efficiency.
基金supported by the National Natural Science Foundation of China,No.30872179 and 81070958a grant from Shanghai Science and Technology Commission,No.08410702200a grant from Shanghai Key Discipline Construction,No.08GWEX0201
文摘Magnetic resonance imaging is a highly sensitive approach for diagnosis of multiple sclerosis, and T2-weighted images can reveal lesions in the cerebral white matter, gray matter, and spinal cord. However, the lesions have a poor correlation with measurable clinical disability. In this study, we performed a large-scale epidemiological survey of 238 patients with multiple sclerosis in eleven districts by network member hospitals in Shanghai, China within 1 year. The involved patients were scanned for position and size of lesions by MRI. Results showed that lesions in the cerebrum, spina cord, or supratentorial position had an impact on the activities of daily living in multiple sclerosis patients, as assessed by the Bayes network. On the other hand, brainstem lesions were very unlikely to influence the activities of daily living, and were not associated with the position of lesion, patient's gender, and patient's living place.