Aiming at the problem of data transfer for virtualmachine monitor in device access, a communications mode in double systems based on multi-core processor is proposed. Two key problem in this mode buffer overflow and p...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
Aiming at the problem of data transfer for virtualmachine monitor in device access, a communications mode in double systems based on multi-core processor is proposed. Two key problem in this mode buffer overflow and package pseudo loss are analyzed, communications mechanism based on Inter-processor interrupts and shared memory is constructed, data transfer between virtual-machine monitor and IO process machine is implemented. Efficiency of communications is enhanced by IPI multiplex, cache customization ect. Finally, guide line of communications such as arrival ratio, transferratio of package, system load is tested and conclusion is presented. Experimental results showed that the communications mode in double systems based on multicore processor could provide communications platform with stabilization and high efficiency.
To address the problem of IO process machine virtualization resulting tight coupling, scheduling delays in virtual machine monitor with hybrid model, a cooperative virtual machine monitor proposed, which uses hardware...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
To address the problem of IO process machine virtualization resulting tight coupling, scheduling delays in virtual machine monitor with hybrid model, a cooperative virtual machine monitor proposed, which uses hardware partition for IO process machine to operate independently, eliminates tight coupling between IO process machine and virtual machine monitor, and avoids asynchronous problems caused by IO process machine involved in scheduling. This model can be extended to multiple parallel IO process machines to achieve load balancing and failure replacement. Implementation and test show that the structure of the virtual machine monitor is able to improve IO performance, and is a viable virtualization scheme.
Multiple-session Sod problem is addressed in the static constraint rBAC model. An improved formal static constraint rBAC model is proposed and it will check the change of the VA relation to decide whether the union of...
详细信息
Multiple-session Sod problem is addressed in the static constraint rBAC model. An improved formal static constraint rBAC model is proposed and it will check the change of the VA relation to decide whether the union of the user's role set will satisfy the MEr constraint during an administrative session. If it will not satisfy the constraint, some necessary withdrawing will be performed. The improved model conserves the advantage of the MEr mechanism and handles multiple-session Sod problem efficiently.
Concept alignment, namely how to make different domains know each other about the semantics of concepts defined by them, is one of the key issues of applying attribute based access control in dynamic open multi-domain...
详细信息
Concept alignment, namely how to make different domains know each other about the semantics of concepts defined by them, is one of the key issues of applying attribute based access control in dynamic open multi-domain environment. In this paper, a novel approach is proposed for building up a concept alignment framework based on otherdomains' knowledge about specific concept relationship. The knowledge comprises five different definite concept relationships which are represented by five logical formulae respectively. Compared with the numerical similarity and those related approaches, the knowledge is more suitable fordepicting concept relationship, while the proposed approach is more adapted in access control. Finally, a trust degree model is introduced into the framework in order to improve the quality of concept alignment results, and how to use and manage the trust degree is discussed.
Taking account of defections existed in general methods of implementing IP security (IPsec) in broadbandrouters, a secure scheme based on fast path and slow path of routers was put forward. The scheme implements IPse...
详细信息
Taking account of defections existed in general methods of implementing IP security (IPsec) in broadbandrouters, a secure scheme based on fast path and slow path of routers was put forward. The scheme implements IPsec with Encryption chip and IPsec software combined, and adopts Encryption adaptive board to support multi-encryption chips. No requirement for change in original hardware architecture of broadbandrouter makes the scheme universal. Wire-speeddata forwarding and encryption are processed in fast path, while local data and protocol data which are non-real time tasks are processed in slow path, in which IPsec security policy (SP) and security association (SA) are also transferred. The scheme was tested in Sr1880s, and testing results showed that the proposed scheme can satisfy the security needs of broadbandrouter.
In this paper, a sliding mode control (SMC) design based on Gaussian radial basis function neural network (GrBFNN) is proposed for the synchronous reluctance motor (SynrM) system in electrical motorcycle applications....
详细信息
Separation of identifier and locator provides good conditions of routing scalability and mobility for Internet routing and lP addressing. Based on the idea of identifier and locator separation, in this paper we i...
详细信息
Separation of identifier and locator provides good conditions of routing scalability and mobility for Internet routing and lP addressing. Based on the idea of identifier and locator separation, in this paper we introduce the access identifier (AId) and the routing locator (rLOC), design a network locality-aware distributed hash table (NLAdHT), then present an identifier mapping information storage algorithm with network locality-aware capability (N3Chord). Simulation performance shows that, the identifiers of distributed network storage nodes assigned by NLA-dHT with good query performance in network topology locality consistency, and the query efficiency and network fault handling capability of N3-Chord is much superior to Chord FingerPNS and ChordFinger.
This paper proposes an analytical method for efficiency optimization of a single-phase brushless dC (BLdC) motor, and also considers a statistical method additionally. The motor characteristics are investigated by usi...
详细信息
ISBN:
(纸本)9788986510119
This paper proposes an analytical method for efficiency optimization of a single-phase brushless dC (BLdC) motor, and also considers a statistical method additionally. The motor characteristics are investigated by using the analytical method such as a magnetic equivalent circuit, and they are verified through the FEA. Therefore, optimal efficiency can be deduced through the analytical method, considering design variables. Then, a statistical method is applied to complement errors of the analytical method. Finally, the validity of proposed methods is confirmed.
In this paper, efficiency optimization design is performed for brushless dC motor (BLdC) driving fan in 80W-grade, using a design of experiment (dOE). The magnetic equivalent circuit (EMC) method is used to calculate ...
详细信息
ISBN:
(纸本)9788986510119
In this paper, efficiency optimization design is performed for brushless dC motor (BLdC) driving fan in 80W-grade, using a design of experiment (dOE). The magnetic equivalent circuit (EMC) method is used to calculate motor efficiency. In a shape of the motor, parameters affecting the efficiency are selected and main and interaction effects of them are analyzed using a full factorial design. As a result, more influential among parameters are reselected. A quadratic approximation function is estimated, by performing a response surface method (rSM) with the reselected parameters. Finally, a shape of an optimized motor is determined by the estimated function and validity is confirmed by analyzing characteristics of the optimized motor.
暂无评论