Resource reconstruction algorithms are studied in this paper to solve the problem of resource on-demand allocation and improve the efficiency of resource utilization in virtual computing resource pool. Based on the id...Resource reconstruction algorithms are studied in this paper to solve the problem of resource on-demand allocation and improve the efficiency of resource utilization in virtual computing resource pool. Based on the idea of resource virtualization and the analysis of the resource status transition, the resource allocation process and the necessity of resource reconstruction are presented, l^esource reconstruction algorithms are designed to determine the resource reconstruction types, and it is shown that they can achieve the goal of resource on-demand allocation through three methodologies: resource combination, resource split, and resource random adjustment. The effects that the resource users have on the resource reconstruction results, the deviation between resources and requirements, and the uniformity of resource distribution are studied by three experiments. The experiments show that resource reconstruction has a close relationship with resource requirements, but it is not the same with current distribution of resources. The algorithms can complete the resource adjustment with a lower cost and form the logic resources to match the demands of resource users easily.展开更多
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra...Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.展开更多
Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper p...Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper presents a novel approach for the construction of the Internet-based Virtual Computing Environment (iVCE), whose sig- nificant mechanisms are on-demand aggregation and autonomic collaboration. The iVCE is built on the open infrastructure of the Internet and provides harmonious, transparent and integrated services for end-users and applications. The concept of iVCE is presented and its architectural framework is described by introducing three core concepts, i.e., autonomic element, virtual commonwealth and virtual executor. Then the connotations, functions and related key technologies of each components of the architecture are deeply analyzed with a case study, iVCE for Memory.展开更多
There is an increasing need to build scalable distributed systems over the Internet infrastructure. However the development of distributed scalable applications suffers from lack of a wide accepted virtual computing e...There is an increasing need to build scalable distributed systems over the Internet infrastructure. However the development of distributed scalable applications suffers from lack of a wide accepted virtual computing environment. Users have to take great efforts on the management and sharing of the involved resources over Internet, whose characteristics are intrinsic growth, autonomy and diversity. To deal with this challenge, Internet-based Virtual Computing Environment (iVCE) is proposed and developed to serve as a platform for distributed scalable applications over the open infrastructure, whose kernel mechanisms are on-demand aggregation and autonomic collaboration of resources. In this paper, we present a programming language for iVCE named Owlet. Owlet conforms with the conceptual model of iVCE, and exposes the iVCE to application developers. As an interaction language based on peer-to-peer content-based publish/subscribe scheme, Owlet abstracts the Internet as an environment for the roles to interact, and uses roles to build a relatively stable view of resources for the on-demand resource aggregation. It provides language constructs to use 1) distributed event driven rules to describe interaction protocols among different roles, 2) conversations to correlate events and rules into a common context, and 3) resource pooling to do fault tolerance and load balancing among networked nodes. We have implemented an Owlet compiler and its runtime environment according to the architecture of iVCE, and built several Owlet applications, including a peer-to-peer file sharing application. Experimental results show that, with iVCE, the separation of resource aggregation logic and business logic significantly eases the process of building scalable distributed applications.展开更多
In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the...In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the energy consumption and(processor) resource utilization, is proposed. In TESA, according to load, hosts in data centers are divided into four classes, that is,host with light load, host with proper load, host with middle load and host with heavy load. By defining TESA, VMs on lightly loaded host or VMs on heavily loaded host are migrated to another host with proper load; VMs on properly loaded host or VMs on middling loaded host are kept constant. Then, based on the TESA, five kinds of VM selection policies(minimization of migrations policy based on TESA(MIMT), maximization of migrations policy based on TESA(MAMT), highest potential growth policy based on TESA(HPGT), lowest potential growth policy based on TESA(LPGT) and random choice policy based on TESA(RCT)) are presented, and MIMT is chosen as the representative policy through experimental comparison. Finally, five research directions are put forward on future energy management. The results of simulation indicate that, as compared with single threshold(ST) algorithm and minimization of migrations(MM) algorithm, MIMT significantly improves the energy efficiency in data centers.展开更多
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed...This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.展开更多
Alveolar echinococcosis(AE)primarily manifests in the liver and exhibits charac-teristics resembling those of slow-growing malignant tumours.Untreated Echino-coccus multilocularis infection can be lethal.By infiltrati...Alveolar echinococcosis(AE)primarily manifests in the liver and exhibits charac-teristics resembling those of slow-growing malignant tumours.Untreated Echino-coccus multilocularis infection can be lethal.By infiltrating the vascular systems,biliary tracts,and the hilum of the liver,it might lead to various problems.Due to its ability to infiltrate neighbouring tissues or metastasize to distant organs,AE can often be mistaken for malignancies.We present a concise overview of the epi-demiological and pathophysiological characteristics of AE,as well as the clinical manifestations of the disease.This article primarily examines the imaging charac-teristics of AE using various imaging techniques such as ultrasonography,com-puted tomography(CT),magnetic resonance imaging,diffusion-weighted ima-ging,and virtual non-enhanced dual-energy CT.We additionally examined the contribution of radiography in the diagnosis,treatment,and monitoring of the condition.展开更多
AIM:To improve the diagnosis of heterotopic pancreas by the use of contrastenhanced computed tomography(CT)imaging and CT virtual endoscopy(CTVE).METHODS:A total of six patients with heterotopic pancreas,as confirmed ...AIM:To improve the diagnosis of heterotopic pancreas by the use of contrastenhanced computed tomography(CT)imaging and CT virtual endoscopy(CTVE).METHODS:A total of six patients with heterotopic pancreas,as confirmed by clinical pathology and immunohistochemistry in the Sixth Affiliated People's Hospital of Shanghai Jiao Tong University,Shanghai,China,were included.Nonenhanced CT and enhanced CT scanning were performed,and the resulting images were reviewed and analyzed using threedimensional postprocessing software,including CTVE.RESULTS:Four males and two females were enrolled.Several heterotopic pancreas sites were involved;three occurred in the stomach,including the gastric antrum(n =2)and lesser curvature(n=1),and two were in the duodenal bulb.Only one case of heterotopic pancreas lesion occurred in the mesentery.Four cases had a solid yet soft tissue density that had a homogeneous pattern when viewed by enhanced CT.Additionally,their CT values were similar to that of the pancreas.The ducts of the heterotopic pancreas tissue,one of the characteristic CT features of heterotopic pancreas tissue,were detected in the CT images of two patients.CTVE images showed normal mucosa around the tissue,which is also an important indicator of a heterotopic pancreas.However,none of the CTVE images showed the typical signs of central dimpling or umbilication.CONCLUSION:CT,enhanced CT and CTVE techniques provide useful information about the location,growth pattern,vascularity,and condition of the gastrointestinal wall around heterotopic pancreatic tissue.展开更多
AIM: To evaluate abdominal and pelvic image characteristics and artifacts on virtual nonenhanced (VNE) images generated from contrast-enhanced dual-energy multidetector computed tomography (MDCT) studies. METHODS: Had...AIM: To evaluate abdominal and pelvic image characteristics and artifacts on virtual nonenhanced (VNE) images generated from contrast-enhanced dual-energy multidetector computed tomography (MDCT) studies. METHODS: Hadassah-Hebrew University Medical Institutional Review Board approval was obtained; 22 patients underwent clinically-indicated abdominal and pelvic single-source dual-energy MDCT (Philips Healthcare, Cleveland, OH, USA), pre- and post-IV administration of Omnipaque 300 contrast (100 cc). Various solid and vascular structures were evaluated. VNE images were generated from the portal contrast-enhanced phase using probabilistic separation. Contrast-enhanced-, regular nonenhanced (RNE)-, and VNE images were evaluated with a total of 1494 density measurements. The ratio of iodine contrast deletion was calculated. Visualization of calcifications, urinary tract stones, and image artifacts in VNE images were assessed. RESULTS: VNE images were successfully generated in all patients. Significant portal-phase iodine contrast deletion was seen in the kidney (61.7%), adrenal gland (55.3%), iliac artery (55.0%), aorta (51.6%), and spleen (34.5%). Contrast deletion was also significant in the right atrium (RA) (51.5%) and portal vein (39.3%), but insignificant in the iliac vein and inferior vena cava (IVC). Average post contrast-to-VNE HU differences were significant (P < 0.05) in the: RA -135.3 (SD 121.8), aorta -114.1 (SD 48.5), iliac artery -104.6 (SD 53.7), kidney -30.3 (SD 34.9), spleen -9.2 (SD 8.8), and portal vein -7.7 (SD 13.2). Average VNE-to-RNE HU differences were significant in all organs but the prostate and subcutaneous fat: aorta 38.0 (SD 9.3), RA 37.8 (SD 16.1), portal vein 21.8 (SD 12.0), IVC 12.2 (SD 11.6), muscle 3.3 (SD 4.9), liver 5.7 (SD 6.4), spleen 22.3 (SD 9.8), kidney 40.5 (SD 6.8), and adrenal 20.7 (SD 13.5). On VNE images, 196/213 calcifications (92%) and 5/6 renal stones (84%) were visualized. Lytic-like artifacts in the vertebral bodies were seen in all studies. CONCLUSION: Iodine deletion in VNE images is most significant in arteries, and less significant in solid organs and veins. Most vascular and intra-abdominal organ calcifications are preserved.展开更多
With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and im...With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and improve the efficiency of data center has become the research focus of researchers all the world. In a cloud environment, virtual machine consolidation(VMC) is an effective strategy that can improve the energy efficiency. However, at the same time, in the process of virtual machine consolidation, we need to deal with the tradeoff between energy consumption and excellent service performance to meet service level agreement(SLA). In this paper, we propose a new virtual machine consolidation framework for achieving better energy efficiency-Improved Underloaded Decision(IUD) algorithm and Minimum Average Utilization Difference(MAUD) algorithm. Finally, based on real workload data on Planet Lab, experiments have been done with the cloud simulation platform Cloud Sim. The experimental result shows that the proposed algorithm can reduce the energy consumption and SLA violation of data centers compared with existing algorithms, improving the energy efficiency of data centers.展开更多
Cloud computing provides the essential infrastructure for multi-tier Ambient Assisted Living(AAL) applications that facilitate people's lives. Resource provisioning is a critically important problem for AAL applic...Cloud computing provides the essential infrastructure for multi-tier Ambient Assisted Living(AAL) applications that facilitate people's lives. Resource provisioning is a critically important problem for AAL applications in cloud data centers(CDCs). This paper focuses on modeling and analysis of multi-tier AAL applications, and aims to optimize resource provisioning while meeting requests' response time constraint. This paper models a multi-tier AAL application as a hybrid multi-tier queueing model consisting of an M/M/c queueing model and multiple M/M/1 queueing models. Then, virtual machine(VM) allocation is formulated as a constrained optimization problem in a CDC, and is further solved with the proposed heuristic VM allocation algorithm(HVMA). The results demonstrate that the proposed model and algorithm can effectively achieve dynamic resource provisioning while meeting the performance constraint.展开更多
BACKGROUND Mucosa-associated lymphoid tissue(MALT)lymphoma originates in the marginal zone of lymphoid tissue.lung is one of the most frequent non-gastrointestinal organs involved,here known as bronchus-associated lym...BACKGROUND Mucosa-associated lymphoid tissue(MALT)lymphoma originates in the marginal zone of lymphoid tissue.lung is one of the most frequent non-gastrointestinal organs involved,here known as bronchus-associated lymphoid tissue(BALT)lymphoma.BALT lymphoma of unknown etiology,and most patients are asymptomatic.The treatment of BALT lymphoma is controversial.CASE SUMMARY A 55-year-old man admitted to hospital had a three-month history of progressively coughing up yellow sputum,chest stuffiness,and shortness of breath.Fiberoptic bronchoscopy revealed mucosal visible beaded bumps 4 cm from the tracheal carina at 9 o'clock and 3 o'clock,the right main bronchus,and the right upper lobe bronchus.Biopsy specimens showed MALT lymphoma.Computed tomography virtual bronchoscopy(CTVB)showed uneven main bronchial wall thickening and multiple nodular protrusion.BALT lymphoma stage IE was diagnosed after a staging examination.We treated the patient with radiotherapy(RT)alone.A total dose of 30.6 Gy/17 f/25 d was given.The patient had no obvious adverse reactions during RT.The CTVB was repeated after RT and showed that the right side of the trachea was slightly thickened.CTVB was repeated 1.5 mo after RT and again showed that the right side of the trachea was slightly thickened.Annual CTVB showed no signs of recurrence.The patient now has no symptoms.CONCLUSION BALT lymphoma is an uncommon disease and shows good prognosis.The treatment of BALT lymphoma is controversial.In recent years,less invasive diagnostic and therapeutic approaches have been emerging.RT was effective and safe in our case.The use of CTVB could provide a noninvasive,repeatable,and accurate method in diagnosis and follow-up.展开更多
The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilit...The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions.展开更多
AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of...AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of a gold standard(0.2% indigo carmine dye) were compared.RESULTS:FICE-filter 4 [red,green,and blue(RGB) wavelengths of 520,500,and 405 nm,respectively] provided the best images for evaluating the vascular pattern compared to white light.The mucosal surface was best assessed using filter 4.However,the views obtained were not rated significantly better than those observed with white light.The "gold standard",indigo carmine(IC) dye,was found to be superior to both white light and filter 4.Filter 6(RGB wavelengths of 580,520,and 460 nm,respectively) allowed for exploration of the IC-stained mucosa.When assessing mucosal polyps,both FICE with magnification,and magnification following dye spraying were superior to the same techniques without magnification and to white light imaging.In the presence of suboptimal bowel preparation,observation with the FICE mode was possible,and endoscopists considered it to be superior to observation with white light.CONCLUSION:FICE-filter 4 with magnification improves the image quality of the colonic vascular patterns obtained with WLE.展开更多
Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are...Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.展开更多
Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machines (...Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machines (VMs) have been widely used in iVCE to isolate different users/jobs and ensure trustworthiness, but traditionally VMs require a long period of time for booting, which cannot meet the requirement of iVCE's large-scale and highly dynamic applications. To address this problem, in this paper we design and implement VirtMan, a fast booting system for a large number of virtual machines in iVCE. VirtMan uses the Linux Small Computer System Interface (SCSI) target to remotely mount to the source image in a scalable hierarchy, and leverages the homogeneity of a set of VMs to transfer only necessary image data at runtime. We have implemented VirtMan both as a standalone system and for OpenStack. In our 100-server testbed, VirtMan boots up 1000 VMs (with a 15 CB image of Windows Server 2008) on 100 physical servers in less than 120 s, which is three orders of magnitude lower than current public clouds.展开更多
This highly interdisciplinary research paper discusses some new insights into the fundamentalproperties of information-rich social networks.It mainly focuses on:i)Postulating the generalproperties of an information-ba...This highly interdisciplinary research paper discusses some new insights into the fundamentalproperties of information-rich social networks.It mainly focuses on:i)Postulating the generalproperties of an information-based networking economy;ii)Modeling emergent and self-organizing featuresof social networks;iii)Discussing how to simulate complex social systems using a field-basedapproach and multi-agent platforms.Additionally,this paper gives some ideas of how to construct avirtual field-based communications network of intelligent agents using currently available computationalintelligence methods.A new simulation paradigm offers some useful concepts to transform multidimensionalfactor space(representing a multiplicity of phenomenal forms and interactions)into the mostuniversal spectral coding system.This paper gives some ideas of how not only the communicationmechanism but also the social agents can be simulated as oscillating processes.展开更多
Cloud computing emerges as a new computing pattern that can provide elastic services for any users around the world. It provides good chances to solve large scale scientific problems with fewer efforts. Application de...Cloud computing emerges as a new computing pattern that can provide elastic services for any users around the world. It provides good chances to solve large scale scientific problems with fewer efforts. Application deployment remains an important issue in clouds. Appropriate scheduling mechanisms can shorten the total completion time of an application and therefore improve the quality of service(QoS) for cloud users. Unlike current scheduling algorithms which mostly focus on single task allocation, we propose a deadline based scheduling approach for data-intensive applications in clouds. It does not simply consider the total completion time of an application as the sum of all its subtasks' completion time. Not only the computation capacity of virtual machine(VM) is considered, but also the communication delay and data access latencies are taken into account. Simulations show that our proposed approach has a decided advantage over the two other algorithms.展开更多
基金supported by National High Technology Research and Development Program of China (863 Program)(No. 2007AA010305)the Excellent Doctor Degree Dissertation Fund of Xi an University of Technology (No. 102-211007)
文摘Resource reconstruction algorithms are studied in this paper to solve the problem of resource on-demand allocation and improve the efficiency of resource utilization in virtual computing resource pool. Based on the idea of resource virtualization and the analysis of the resource status transition, the resource allocation process and the necessity of resource reconstruction are presented, l^esource reconstruction algorithms are designed to determine the resource reconstruction types, and it is shown that they can achieve the goal of resource on-demand allocation through three methodologies: resource combination, resource split, and resource random adjustment. The effects that the resource users have on the resource reconstruction results, the deviation between resources and requirements, and the uniformity of resource distribution are studied by three experiments. The experiments show that resource reconstruction has a close relationship with resource requirements, but it is not the same with current distribution of resources. The algorithms can complete the resource adjustment with a lower cost and form the logic resources to match the demands of resource users easily.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA1Z2070 ) and the National Natural Science Foundation of China (No. 90412013).
文摘Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.
文摘Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper presents a novel approach for the construction of the Internet-based Virtual Computing Environment (iVCE), whose sig- nificant mechanisms are on-demand aggregation and autonomic collaboration. The iVCE is built on the open infrastructure of the Internet and provides harmonious, transparent and integrated services for end-users and applications. The concept of iVCE is presented and its architectural framework is described by introducing three core concepts, i.e., autonomic element, virtual commonwealth and virtual executor. Then the connotations, functions and related key technologies of each components of the architecture are deeply analyzed with a case study, iVCE for Memory.
基金Supported by the National Basic Research 973 Program of China under Grant Nos.2005CB321800 and 2011CB302600the National Natural Science Foundation of China under Grant Nos.90612009,60725206 and 60625203
文摘There is an increasing need to build scalable distributed systems over the Internet infrastructure. However the development of distributed scalable applications suffers from lack of a wide accepted virtual computing environment. Users have to take great efforts on the management and sharing of the involved resources over Internet, whose characteristics are intrinsic growth, autonomy and diversity. To deal with this challenge, Internet-based Virtual Computing Environment (iVCE) is proposed and developed to serve as a platform for distributed scalable applications over the open infrastructure, whose kernel mechanisms are on-demand aggregation and autonomic collaboration of resources. In this paper, we present a programming language for iVCE named Owlet. Owlet conforms with the conceptual model of iVCE, and exposes the iVCE to application developers. As an interaction language based on peer-to-peer content-based publish/subscribe scheme, Owlet abstracts the Internet as an environment for the roles to interact, and uses roles to build a relatively stable view of resources for the on-demand resource aggregation. It provides language constructs to use 1) distributed event driven rules to describe interaction protocols among different roles, 2) conversations to correlate events and rules into a common context, and 3) resource pooling to do fault tolerance and load balancing among networked nodes. We have implemented an Owlet compiler and its runtime environment according to the architecture of iVCE, and built several Owlet applications, including a peer-to-peer file sharing application. Experimental results show that, with iVCE, the separation of resource aggregation logic and business logic significantly eases the process of building scalable distributed applications.
基金Project(61272148) supported by the National Natural Science Foundation of ChinaProject(20120162110061) supported by the Doctoral Programs of Ministry of Education of China+1 种基金Project(CX2014B066) supported by the Hunan Provincial Innovation Foundation for Postgraduate,ChinaProject(2014zzts044) supported by the Fundamental Research Funds for the Central Universities,China
文摘In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the energy consumption and(processor) resource utilization, is proposed. In TESA, according to load, hosts in data centers are divided into four classes, that is,host with light load, host with proper load, host with middle load and host with heavy load. By defining TESA, VMs on lightly loaded host or VMs on heavily loaded host are migrated to another host with proper load; VMs on properly loaded host or VMs on middling loaded host are kept constant. Then, based on the TESA, five kinds of VM selection policies(minimization of migrations policy based on TESA(MIMT), maximization of migrations policy based on TESA(MAMT), highest potential growth policy based on TESA(HPGT), lowest potential growth policy based on TESA(LPGT) and random choice policy based on TESA(RCT)) are presented, and MIMT is chosen as the representative policy through experimental comparison. Finally, five research directions are put forward on future energy management. The results of simulation indicate that, as compared with single threshold(ST) algorithm and minimization of migrations(MM) algorithm, MIMT significantly improves the energy efficiency in data centers.
基金supported by The National Natural Science Foundation for Young Scientists of China under Grant No.61303263the Jiangsu Provincial Research Foundation for Basic Research(Natural Science Foundation)under Grant No.BK20150201+4 种基金the Scientific Research Key Project of Beijing Municipal Commission of Education under Grant No.KZ201210015015Project Supported by the National Natural Science Foundation of China(Grant No.61370140)the Scientific Research Common Program of the Beijing Municipal Commission of Education(Grant No.KMKM201410015006)The National Science Foundation of China under Grant Nos.61232016 and U1405254and the PAPD fund
文摘This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.
文摘Alveolar echinococcosis(AE)primarily manifests in the liver and exhibits charac-teristics resembling those of slow-growing malignant tumours.Untreated Echino-coccus multilocularis infection can be lethal.By infiltrating the vascular systems,biliary tracts,and the hilum of the liver,it might lead to various problems.Due to its ability to infiltrate neighbouring tissues or metastasize to distant organs,AE can often be mistaken for malignancies.We present a concise overview of the epi-demiological and pathophysiological characteristics of AE,as well as the clinical manifestations of the disease.This article primarily examines the imaging charac-teristics of AE using various imaging techniques such as ultrasonography,com-puted tomography(CT),magnetic resonance imaging,diffusion-weighted ima-ging,and virtual non-enhanced dual-energy CT.We additionally examined the contribution of radiography in the diagnosis,treatment,and monitoring of the condition.
基金Supported by Science and Technology Commission of Shanghai Municipality,Grant No.08411951200
文摘AIM:To improve the diagnosis of heterotopic pancreas by the use of contrastenhanced computed tomography(CT)imaging and CT virtual endoscopy(CTVE).METHODS:A total of six patients with heterotopic pancreas,as confirmed by clinical pathology and immunohistochemistry in the Sixth Affiliated People's Hospital of Shanghai Jiao Tong University,Shanghai,China,were included.Nonenhanced CT and enhanced CT scanning were performed,and the resulting images were reviewed and analyzed using threedimensional postprocessing software,including CTVE.RESULTS:Four males and two females were enrolled.Several heterotopic pancreas sites were involved;three occurred in the stomach,including the gastric antrum(n =2)and lesser curvature(n=1),and two were in the duodenal bulb.Only one case of heterotopic pancreas lesion occurred in the mesentery.Four cases had a solid yet soft tissue density that had a homogeneous pattern when viewed by enhanced CT.Additionally,their CT values were similar to that of the pancreas.The ducts of the heterotopic pancreas tissue,one of the characteristic CT features of heterotopic pancreas tissue,were detected in the CT images of two patients.CTVE images showed normal mucosa around the tissue,which is also an important indicator of a heterotopic pancreas.However,none of the CTVE images showed the typical signs of central dimpling or umbilication.CONCLUSION:CT,enhanced CT and CTVE techniques provide useful information about the location,growth pattern,vascularity,and condition of the gastrointestinal wall around heterotopic pancreatic tissue.
文摘AIM: To evaluate abdominal and pelvic image characteristics and artifacts on virtual nonenhanced (VNE) images generated from contrast-enhanced dual-energy multidetector computed tomography (MDCT) studies. METHODS: Hadassah-Hebrew University Medical Institutional Review Board approval was obtained; 22 patients underwent clinically-indicated abdominal and pelvic single-source dual-energy MDCT (Philips Healthcare, Cleveland, OH, USA), pre- and post-IV administration of Omnipaque 300 contrast (100 cc). Various solid and vascular structures were evaluated. VNE images were generated from the portal contrast-enhanced phase using probabilistic separation. Contrast-enhanced-, regular nonenhanced (RNE)-, and VNE images were evaluated with a total of 1494 density measurements. The ratio of iodine contrast deletion was calculated. Visualization of calcifications, urinary tract stones, and image artifacts in VNE images were assessed. RESULTS: VNE images were successfully generated in all patients. Significant portal-phase iodine contrast deletion was seen in the kidney (61.7%), adrenal gland (55.3%), iliac artery (55.0%), aorta (51.6%), and spleen (34.5%). Contrast deletion was also significant in the right atrium (RA) (51.5%) and portal vein (39.3%), but insignificant in the iliac vein and inferior vena cava (IVC). Average post contrast-to-VNE HU differences were significant (P < 0.05) in the: RA -135.3 (SD 121.8), aorta -114.1 (SD 48.5), iliac artery -104.6 (SD 53.7), kidney -30.3 (SD 34.9), spleen -9.2 (SD 8.8), and portal vein -7.7 (SD 13.2). Average VNE-to-RNE HU differences were significant in all organs but the prostate and subcutaneous fat: aorta 38.0 (SD 9.3), RA 37.8 (SD 16.1), portal vein 21.8 (SD 12.0), IVC 12.2 (SD 11.6), muscle 3.3 (SD 4.9), liver 5.7 (SD 6.4), spleen 22.3 (SD 9.8), kidney 40.5 (SD 6.8), and adrenal 20.7 (SD 13.5). On VNE images, 196/213 calcifications (92%) and 5/6 renal stones (84%) were visualized. Lytic-like artifacts in the vertebral bodies were seen in all studies. CONCLUSION: Iodine deletion in VNE images is most significant in arteries, and less significant in solid organs and veins. Most vascular and intra-abdominal organ calcifications are preserved.
基金supported by the National Natural Science Foundation of China (NSFC) (No. 61272200, 10805019)the Program for Excellent Young Teachers in Higher Education of Guangdong, China (No. Yq2013012)+2 种基金the Fundamental Research Funds for the Central Universities (2015ZJ010)the Special Support Program of Guangdong Province (201528004)the Pearl River Science & Technology Star Project (201610010046)
文摘With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and improve the efficiency of data center has become the research focus of researchers all the world. In a cloud environment, virtual machine consolidation(VMC) is an effective strategy that can improve the energy efficiency. However, at the same time, in the process of virtual machine consolidation, we need to deal with the tradeoff between energy consumption and excellent service performance to meet service level agreement(SLA). In this paper, we propose a new virtual machine consolidation framework for achieving better energy efficiency-Improved Underloaded Decision(IUD) algorithm and Minimum Average Utilization Difference(MAUD) algorithm. Finally, based on real workload data on Planet Lab, experiments have been done with the cloud simulation platform Cloud Sim. The experimental result shows that the proposed algorithm can reduce the energy consumption and SLA violation of data centers compared with existing algorithms, improving the energy efficiency of data centers.
文摘Cloud computing provides the essential infrastructure for multi-tier Ambient Assisted Living(AAL) applications that facilitate people's lives. Resource provisioning is a critically important problem for AAL applications in cloud data centers(CDCs). This paper focuses on modeling and analysis of multi-tier AAL applications, and aims to optimize resource provisioning while meeting requests' response time constraint. This paper models a multi-tier AAL application as a hybrid multi-tier queueing model consisting of an M/M/c queueing model and multiple M/M/1 queueing models. Then, virtual machine(VM) allocation is formulated as a constrained optimization problem in a CDC, and is further solved with the proposed heuristic VM allocation algorithm(HVMA). The results demonstrate that the proposed model and algorithm can effectively achieve dynamic resource provisioning while meeting the performance constraint.
文摘BACKGROUND Mucosa-associated lymphoid tissue(MALT)lymphoma originates in the marginal zone of lymphoid tissue.lung is one of the most frequent non-gastrointestinal organs involved,here known as bronchus-associated lymphoid tissue(BALT)lymphoma.BALT lymphoma of unknown etiology,and most patients are asymptomatic.The treatment of BALT lymphoma is controversial.CASE SUMMARY A 55-year-old man admitted to hospital had a three-month history of progressively coughing up yellow sputum,chest stuffiness,and shortness of breath.Fiberoptic bronchoscopy revealed mucosal visible beaded bumps 4 cm from the tracheal carina at 9 o'clock and 3 o'clock,the right main bronchus,and the right upper lobe bronchus.Biopsy specimens showed MALT lymphoma.Computed tomography virtual bronchoscopy(CTVB)showed uneven main bronchial wall thickening and multiple nodular protrusion.BALT lymphoma stage IE was diagnosed after a staging examination.We treated the patient with radiotherapy(RT)alone.A total dose of 30.6 Gy/17 f/25 d was given.The patient had no obvious adverse reactions during RT.The CTVB was repeated after RT and showed that the right side of the trachea was slightly thickened.CTVB was repeated 1.5 mo after RT and again showed that the right side of the trachea was slightly thickened.Annual CTVB showed no signs of recurrence.The patient now has no symptoms.CONCLUSION BALT lymphoma is an uncommon disease and shows good prognosis.The treatment of BALT lymphoma is controversial.In recent years,less invasive diagnostic and therapeutic approaches have been emerging.RT was effective and safe in our case.The use of CTVB could provide a noninvasive,repeatable,and accurate method in diagnosis and follow-up.
基金The National Basic Research 973 Program of China (No2005CB321804)
文摘The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions.
基金Supported by Consejería de Educación,Cultura y Deportes,Gobierno de Canarias PI2002/138,the Instituto de Salud Carlos III C03/02
文摘AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of a gold standard(0.2% indigo carmine dye) were compared.RESULTS:FICE-filter 4 [red,green,and blue(RGB) wavelengths of 520,500,and 405 nm,respectively] provided the best images for evaluating the vascular pattern compared to white light.The mucosal surface was best assessed using filter 4.However,the views obtained were not rated significantly better than those observed with white light.The "gold standard",indigo carmine(IC) dye,was found to be superior to both white light and filter 4.Filter 6(RGB wavelengths of 580,520,and 460 nm,respectively) allowed for exploration of the IC-stained mucosa.When assessing mucosal polyps,both FICE with magnification,and magnification following dye spraying were superior to the same techniques without magnification and to white light imaging.In the presence of suboptimal bowel preparation,observation with the FICE mode was possible,and endoscopists considered it to be superior to observation with white light.CONCLUSION:FICE-filter 4 with magnification improves the image quality of the colonic vascular patterns obtained with WLE.
文摘Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.
基金supported by the National Natural Science Foundation of China(Nos.61379055 and 61379053)
文摘Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machines (VMs) have been widely used in iVCE to isolate different users/jobs and ensure trustworthiness, but traditionally VMs require a long period of time for booting, which cannot meet the requirement of iVCE's large-scale and highly dynamic applications. To address this problem, in this paper we design and implement VirtMan, a fast booting system for a large number of virtual machines in iVCE. VirtMan uses the Linux Small Computer System Interface (SCSI) target to remotely mount to the source image in a scalable hierarchy, and leverages the homogeneity of a set of VMs to transfer only necessary image data at runtime. We have implemented VirtMan both as a standalone system and for OpenStack. In our 100-server testbed, VirtMan boots up 1000 VMs (with a 15 CB image of Windows Server 2008) on 100 physical servers in less than 120 s, which is three orders of magnitude lower than current public clouds.
基金supported by EU-Funded Research Project Reg. under Grant No.S-VP2-1.3-UM-01-K-01-065
文摘This highly interdisciplinary research paper discusses some new insights into the fundamentalproperties of information-rich social networks.It mainly focuses on:i)Postulating the generalproperties of an information-based networking economy;ii)Modeling emergent and self-organizing featuresof social networks;iii)Discussing how to simulate complex social systems using a field-basedapproach and multi-agent platforms.Additionally,this paper gives some ideas of how to construct avirtual field-based communications network of intelligent agents using currently available computationalintelligence methods.A new simulation paradigm offers some useful concepts to transform multidimensionalfactor space(representing a multiplicity of phenomenal forms and interactions)into the mostuniversal spectral coding system.This paper gives some ideas of how not only the communicationmechanism but also the social agents can be simulated as oscillating processes.
基金supported by the National Natural Science Foundation of China (51507084)the NUPTSF (NY214203)the Natural Science Foundation for Colleges and Universities in Jiangsu Province (14KJB120009)
文摘Cloud computing emerges as a new computing pattern that can provide elastic services for any users around the world. It provides good chances to solve large scale scientific problems with fewer efforts. Application deployment remains an important issue in clouds. Appropriate scheduling mechanisms can shorten the total completion time of an application and therefore improve the quality of service(QoS) for cloud users. Unlike current scheduling algorithms which mostly focus on single task allocation, we propose a deadline based scheduling approach for data-intensive applications in clouds. It does not simply consider the total completion time of an application as the sum of all its subtasks' completion time. Not only the computation capacity of virtual machine(VM) is considered, but also the communication delay and data access latencies are taken into account. Simulations show that our proposed approach has a decided advantage over the two other algorithms.