A new method of collision-free path plan integrated in virtual processing is developed to improve the efficiency of laser surface hardening on dies. The path plan is based on the premise of no collision and the optimi...A new method of collision-free path plan integrated in virtual processing is developed to improve the efficiency of laser surface hardening on dies. The path plan is based on the premise of no collision and the optimization object is the shortest path. The optimization model of collision-free path is built from traveling salesman problem (TSP). Collision-free path between two machining points is calculated in configuration space (C-Space). Ant colony optimization (ACO) algorithm is applied to TSP of all the machining points to find the shortest path, which is simulated in virtual environment set up by IGRIP software. Virtual machining time, no-collision report, etc, are put out atter the simulation. An example on autobody die is processed in the virtual platform, the simulation results display that ACO has perfect optimization effect, and the method of virtual processing with integration of collision-free optimal path is practical.展开更多
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle...Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.展开更多
This paper proposes reliability and maintenance models for systems suffering random shocks arriving according to a non-homogeneous Poisson process.The system degradation process include two stages:from the installatio...This paper proposes reliability and maintenance models for systems suffering random shocks arriving according to a non-homogeneous Poisson process.The system degradation process include two stages:from the installation of a new system to an initial point of a defect(normal stage),and then from that point to failure(defective stage),following the delay time concept.By employing the virtual age method,the impact of external shocks on the system degradation process is characterized by random virtual age increment in the two stages,resulting in the corresponding two-stage virtual age process.When operating in the defective state,the system becomes more susceptible to fatigue and suffers from a greater aging rate.Replacement is carried out either on failure or on the detection of a defective state at periodic or opportunistic inspections.This paper evaluates system reliability performance and investigates the optimal opportunistic maintenance policy.A case study on a cooling system is given to verify the obtained results.展开更多
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat...Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.展开更多
基金This project is supported by Great Device Development Project of Chinese Academy of Sciences, China(No.[1997]167)Knowledge Innovation Great Project of Chinese Academy of Sciences, China, in 2000-2003(No. KGCX1-11).
文摘A new method of collision-free path plan integrated in virtual processing is developed to improve the efficiency of laser surface hardening on dies. The path plan is based on the premise of no collision and the optimization object is the shortest path. The optimization model of collision-free path is built from traveling salesman problem (TSP). Collision-free path between two machining points is calculated in configuration space (C-Space). Ant colony optimization (ACO) algorithm is applied to TSP of all the machining points to find the shortest path, which is simulated in virtual environment set up by IGRIP software. Virtual machining time, no-collision report, etc, are put out atter the simulation. An example on autobody die is processed in the virtual platform, the simulation results display that ACO has perfect optimization effect, and the method of virtual processing with integration of collision-free optimal path is practical.
文摘Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.
基金supported by the National Natural Science Foundation of China(72001026).
文摘This paper proposes reliability and maintenance models for systems suffering random shocks arriving according to a non-homogeneous Poisson process.The system degradation process include two stages:from the installation of a new system to an initial point of a defect(normal stage),and then from that point to failure(defective stage),following the delay time concept.By employing the virtual age method,the impact of external shocks on the system degradation process is characterized by random virtual age increment in the two stages,resulting in the corresponding two-stage virtual age process.When operating in the defective state,the system becomes more susceptible to fatigue and suffers from a greater aging rate.Replacement is carried out either on failure or on the detection of a defective state at periodic or opportunistic inspections.This paper evaluates system reliability performance and investigates the optimal opportunistic maintenance policy.A case study on a cooling system is given to verify the obtained results.
基金Supported by the National Natural Science Foundation of China(61170026)
文摘Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.