To see the other types of publications on this topic, follow the link: System call virtual machine.

Journal articles on the topic 'System call virtual machine'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'System call virtual machine.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Ruirui, and Xin Xiao. "Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment." Mobile Information Systems 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2301970.

Full text
Abstract:
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state of user-level programs, which can detect attacks on the dynamic runtime of applications and has high real-time performance. There are five modules in the model: antigen presenting module, signal acquisition module, immune response module, signal measurement module, and information monitoring module, which are distributed into different levels of virtual machine environment. Performance analysis and experimental results show that the model brings a small performance overhead for the virtual machine system and has a good detection performance. It is applicable to judge the state of user-level application in guest virtual machine, and it is feasible to use it to increase the user-level security in software services of cloud computing platform.
APA, Harvard, Vancouver, ISO, and other styles
2

Sok, Song-Woo, Young-Woo Jung, and Cheol-Hun Lee. "Optimizing System Call Latency of ARM Virtual Machines." Journal of Physics: Conference Series 787 (January 2017): 012032. http://dx.doi.org/10.1088/1742-6596/787/1/012032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

PARVEEN, TAUHIDA, SCOTT TILLEY, WILLIAM ALLEN, GERALD MARIN, and RICHARD FORD. "DETECTING EMULATED ENVIRONMENTS." International Journal of Software Engineering and Knowledge Engineering 22, no. 07 (November 2012): 927–44. http://dx.doi.org/10.1142/s0218194012500258.

Full text
Abstract:
One of the most powerful tools in the hacker's reverse engineering arsenal is the virtual machine. These systems provide a simple mechanism for executing code in an environment in which the program can be carefully monitored and controlled, allowing attackers to subvert copy protection and access trade secrets. One of the challenges for anti-reverse engineering tools is how to protect software within such an untrustworthy environment. From the perspective of a running program, detecting an emulated environment is not trivial: the attacker can emulate the result of different operations with arbitrarily high fidelity. This paper demonstrates a mechanism that is able to detect even carefully constructed virtual environments by focusing on the stochastic variation of system call timings. A statistical technique for detecting emulated environments is presented, which uses a model of normal system call behavior to successfully identify two commonly used virtual environments under realistic conditions.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Xin Wei, Yin Shan Jia, Chun Hua Yu, Zi Long Chen, Cheng Wang, and Da Zhou Zhu. "Application of Java-Called DLL in Crop Breeding Data Analysis System." Applied Mechanics and Materials 543-547 (March 2014): 3243–47. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3243.

Full text
Abstract:
The collected massive data during the breeding process usually cost plenty of human power. Therefore, it is urgent to create highly-efficient specific breeding data analysis software to assist breeders to screen fine varieties. For this reason, this paper developed a breeding data management analysis system by taking MyEclipse as development tool, which covers various statistical analysis techniques. In the development process of each algorithm module, JNI technology is adopted to realize Java-called DLL and complete algorithm call, improving the execution efficiency of a large number of arithmetical operations. This paper introduced Java-called DLL by aid of JNI technology in One-Way ANOVA in details and the parameter passing between Java and C++ and how to realize Java-called DLL in the operating system without C++ operating environment. Through the above-mentioned call, the advantages of C++ and Java are comprehensively considered, which not only lightens the burden of Java virtual machine and avoids the repeatability, but also improves the efficiency of arithmetical operation and the utilization rate of codes.
APA, Harvard, Vancouver, ISO, and other styles
5

Sperber, Michael, and Lennart Augustsson. "Special Issue on Run-Time Systems and Target Platforms for Functional Languages: Editorial." Journal of Functional Programming 24, no. 6 (November 2014): 612. http://dx.doi.org/10.1017/s0956796815000039.

Full text
Abstract:
Compiling functional languages to the existing variety of platforms calls for sophisticated implementations of run-time systems. This special issue focuses on this often-neglected aspect. We volunteered to compile this special issue in 2012 and immediately started soliciting papers. The original call for papers covered native-code platforms as well as run-time systems originally designed for non-functional languages such as the Java Virtual Machine or the .NET Common Language Runtime.
APA, Harvard, Vancouver, ISO, and other styles
6

Sato, Masaya, Hideo Taniguchi, and Toshihiro Yamauchi. "Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor." International Journal of Space-Based and Situated Computing 9, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijssc.2019.100007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sato, Masaya, Hideo Taniguchi, and Toshihiro Yamauchi. "Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor." International Journal of Space-Based and Situated Computing 9, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijssc.2019.10021589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Umamaheswari, K., and S. Sujatha. "Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud." Defence Science Journal 67, no. 6 (November 6, 2017): 645. http://dx.doi.org/10.14429/dsj.67.11118.

Full text
Abstract:
<p class="p1">Data security and privacy are perennial concerns related to cloud migration, whether it is about applications, business or customers. In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs). The model has two significant contributions for impregnable protection, one is to reduce alert generation delay by dynamic correlation and the second is to support the supervised learning of malware detection through system call analysis. The defence formation facilitates malware detection with linear support vector machine- stochastic gradient descent (SVM-SGD) statistical algorithm. It requires little computational effort to counter the distributed, co-ordinated attacks efficiently. The framework design, then, takes distributed port scan attack as an example for assessing the efficiency in terms of reduction in alert generation delay, the number of false positives and learning time through comparison with existing techniques is discussed.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Zonggang. "Social Governance Structure Construction and Resource Allocation Methods under the Management Mode of the Internet of Things." Wireless Communications and Mobile Computing 2021 (July 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/7963311.

Full text
Abstract:
Aiming at the problems in the social governance structure level under the management mode of the Internet of Things, this paper designs a network agent based on the idea of service grid construction that has the functions of service resource configuration discovery, load balancing, and protocol conversion. Using it as a service governance infrastructure reduces the coupling between business services and service governance, and the network agent will intercept the service call traffic within the platform to achieve cross-protocol and cross-frame service communication. Through the proposed global query decomposition strategy and algorithm, a global query mapping is realized, which solves the problem of global query decomposition based on the global data model. We designed the unified management mechanism of two commonly used IoT databases based on XML. This process involves the realization of heterogeneous Internet of Things database resource configuration, data mode conversion, and global query mapping. Among them, in the process of data schema conversion, the conflict of the data in the schema mapping is resolved, the XML Schema is generated, the schema mapping metadata is established, and the XML document of the data is generated. We build a framework for optimal allocation of cloud computing resources based on load forecasting and propose an adaptive elastic control system for resource allocation based on resource status monitoring and demand forecasting. In view of the low resource utilization problem caused by the resource management mode of single virtual machine serving single user adopted by Internet of Things service providers, this paper constructs a new public cloud architecture with a five-layer structure. On the basis of this architecture, an adaptive configuration mode of virtualized resources based on a single virtual machine serving multiple users is proposed. This mode can automatically search for optimal virtualization resources for application resource requests made by different users and run different applications on the same virtual machine without affecting the quality of service, so that IoT providers can guarantee services. At the same time, it improves the utilization efficiency of IoT resources and reduces energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Ying-Dar, and Chun-Ying Huang. "Three-Phase Detection and Classification for Android Malware Based on Common Behaviors." Journal of Communications Software and Systems 12, no. 3 (September 21, 2016): 157. http://dx.doi.org/10.24138/jcomss.v12i3.80.

Full text
Abstract:
Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposedapproach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification.
APA, Harvard, Vancouver, ISO, and other styles
11

Ma, Jun, Jiang Chun Ren, Zhi Ying Wang, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Implementing Efficient Management and Security of Removable Storage by FVM." Applied Mechanics and Materials 197 (September 2012): 467–72. http://dx.doi.org/10.4028/www.scientific.net/amm.197.467.

Full text
Abstract:
The security usage and management of removable storage devices has become a vital problem for enterprises and individuals. However, the required strict security policies for preventing unauthorized access to sensitive data raise the decrease of usability and flexibility. The main problem rests on the binding between security and application domains which stifles the initiative of the devices on themselves. This paper presents TRS, an efficient active architecture that binds a feather-weight virtual machine (FVM) to the removable storage device. It is designed based on an inside-bound smart card as well as the chip operation system (COS) which builds a trust channel between the FVM and the device. The FVM is set up by a trust chain and provides isolated usage environment for process accessing the device which prevents the obtained data from leakage. Finally, we implement a USB flash disk we call as UTrustDisk based on the hardware structure of Amordisk which is a security product of Nationz Technologies Inc. The results show the average overhead of read and write is 7.5% and 11.5%.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhan, Yang, Alex Conway, Yizheng Jiao, Nirjhar Mukherjee, Ian Groombridge, Michael A. Bender, Martin Farach-Colton, et al. "Copy-on-Abundant-Write for Nimble File System Clones." ACM Transactions on Storage 17, no. 1 (February 2, 2021): 1–27. http://dx.doi.org/10.1145/3423495.

Full text
Abstract:
Making logical copies, or clones, of files and directories is critical to many real-world applications and workflows, including backups, virtual machines, and containers. An ideal clone implementation meets the following performance goals: (1) creating the clone has low latency; (2) reads are fast in all versions (i.e., spatial locality is always maintained, even after modifications); (3) writes are fast in all versions; (4) the overall system is space efficient. Implementing a clone operation that realizes all four properties, which we call a nimble clone , is a long-standing open problem. This article describes nimble clones in B-ϵ-tree File System (BetrFS), an open-source, full-path-indexed, and write-optimized file system. The key observation behind our work is that standard copy-on-write heuristics can be too coarse to be space efficient, or too fine-grained to preserve locality. On the other hand, a write-optimized key-value store, such as a Bε-tree or an log-structured merge-tree (LSM)-tree, can decouple the logical application of updates from the granularity at which data is physically copied. In our write-optimized clone implementation, data sharing among clones is only broken when a clone has changed enough to warrant making a copy, a policy we call copy-on-abundant-write . We demonstrate that the algorithmic work needed to batch and amortize the cost of BetrFS clone operations does not erode the performance advantages of baseline BetrFS; BetrFS performance even improves in a few cases. BetrFS cloning is efficient; for example, when using the clone operation for container creation, BetrFS outperforms a simple recursive copy by up to two orders-of-magnitude and outperforms file systems that have specialized Linux Containers (LXC) backends by 3--4×.
APA, Harvard, Vancouver, ISO, and other styles
13

OH, HYEONG-SEOK, SOO-MOOK MOON, and DONG-HEON JUNG. "HYBRID JAVA COMPILATION OF JUST-IN-TIME AND AHEAD-OF TIME FOR EMBEDDED SYSTEMS." Journal of Circuits, Systems and Computers 21, no. 02 (April 2012): 1240001. http://dx.doi.org/10.1142/s0218126612400014.

Full text
Abstract:
Many embedded Java software platforms execute two types of Java classes: those installed statically on the client device and those downloaded dynamically from service providers at runtime. For higher performance, it would be desirable to compile static Java classes by ahead-of-time compiler (AOTC) and to handle dynamically downloaded classes by just-in-time compiler (JITC), providing a hybrid compilation environment. This paper proposes a hybrid Java compilation approach and performs an initial case study with a hybrid environment, which is constructed simply by merging an existing AOTC and a JITC for the same Java virtual machine. Both compilers are developed independently for their own performance advantages with a generally accepted approach of compilation, but we merged them as efficiently as possible. Contrary to our expectations, the hybrid environment does not deliver a performance, in-between of full-JITC's and full-AOTC's. In fact, its performance is even lower than full-JITC's for many benchmarks. We analyzed the result and found that a naive merge of JITC and AOTC may result in inefficiencies, especially due to calls between JITC methods and AOTC methods. Based on these observations, we propose some ideas to reduce such a call overhead. We also observed that the distribution of JITC methods and AOTC methods is also important, and experimented with various distributions to understand when a hybrid environment can deliver a desired performance. Finally, we discuss how JITC and AOTC should be designed for efficient hybrid execution.
APA, Harvard, Vancouver, ISO, and other styles
14

Coveney, Peter V., Edward R. Dougherty, and Roger R. Highfield. "Big data need big theory too." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2080 (November 13, 2016): 20160153. http://dx.doi.org/10.1098/rsta.2016.0153.

Full text
Abstract:
The current interest in big data, machine learning and data analytics has generated the widespread impression that such methods are capable of solving most problems without the need for conventional scientific methods of inquiry. Interest in these methods is intensifying, accelerated by the ease with which digitized data can be acquired in virtually all fields of endeavour, from science, healthcare and cybersecurity to economics, social sciences and the humanities. In multiscale modelling, machine learning appears to provide a shortcut to reveal correlations of arbitrary complexity between processes at the atomic, molecular, meso- and macroscales. Here, we point out the weaknesses of pure big data approaches with particular focus on biology and medicine, which fail to provide conceptual accounts for the processes to which they are applied. No matter their ‘depth’ and the sophistication of data-driven methods, such as artificial neural nets, in the end they merely fit curves to existing data. Not only do these methods invariably require far larger quantities of data than anticipated by big data aficionados in order to produce statistically reliable results, but they can also fail in circumstances beyond the range of the data used to train them because they are not designed to model the structural characteristics of the underlying system. We argue that it is vital to use theory as a guide to experimental design for maximal efficiency of data collection and to produce reliable predictive models and conceptual knowledge. Rather than continuing to fund, pursue and promote ‘blind’ big data projects with massive budgets, we call for more funding to be allocated to the elucidation of the multiscale and stochastic processes controlling the behaviour of complex systems, including those of life, medicine and healthcare. This article is part of the themed issue ‘Multiscale modelling at the physics–chemistry–biology interface’.
APA, Harvard, Vancouver, ISO, and other styles
15

Vaghani, Satyam B. "Virtual machine file system." ACM SIGOPS Operating Systems Review 44, no. 4 (December 13, 2010): 57–70. http://dx.doi.org/10.1145/1899928.1899935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Schinz, Michel, and Martin Odersky. "Tail call elimination on the Java Virtual Machine." Electronic Notes in Theoretical Computer Science 59, no. 1 (November 2001): 158–71. http://dx.doi.org/10.1016/s1571-0661(05)80459-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mohan, Mohit, Ruth Scally, James Reed, and Calin Cavaropol. "Microsoft teams virtual handover system." BJPsych Open 7, S1 (June 2021): S209. http://dx.doi.org/10.1192/bjo.2021.559.

Full text
Abstract:
AimsAccurate and timely handover of clinical information is of great importance to continuity and safety of care. Psychiatry doctors typically cover a number of sites across a catchment when they are on-call. Consequently, handover between on-call teams and day teams in psychiatric hospitals is reliant on using the nursing staff as an intermediary to flag concerns or relying on the day teams proactively checking the notes on daily basis for outstanding tasks.The key objective of this project was to use Microsoft teams to establish a handover system that is efficient, safe, reliable, easy to use and replicable.MethodA microsoft teams group was created comprising of all the medical staff members working at inpatient units across three sites that are part of Birmingham and Solihull Mental Health Trust. These members were divided into two groups - the ‘on-call team’ and the ‘day team’. Within the ‘day team’, every consultant was grouped with their junior doctors to form multiple subgroups.A system was established wherein the two teams could communicate with each other by posting a message and tagging the appropriate team. A provision was made to create a channel for every ward to allow for easy segregation and monitoring of tasks.Qualitative information about the use of the tool was monitored by monthly focus group meetings. A formal review of the messages was conducted after 8 weeks to assess the following parameters:Number of messages postedNumber of messages acknowledgedNumber of safety-related incidentsResultInitial evaluation of the results suggests that the new handover system was perceived to be safe, accurate and efficient while being intuitive and hassle-free. This increased the quantity and enhanced the quality of communication between the ‘on-call’ and the ‘day teams’ and allowed for early completion of tasks while reducing the number of safety-related incidents.ConclusionThe Microsoft teams proved to be a viable alternate tool to create a virtual handover process that is efficient, safe, reliable and user-friendly. It also has the potential to enhance the communication between inpatient and community teams.
APA, Harvard, Vancouver, ISO, and other styles
18

Nam, Hyun-Woo, and Neung-Soo Park. "System Integrity Monitoring System using Kernel-based Virtual Machine." KIPS Transactions:PartC 18C, no. 3 (June 30, 2011): 157–66. http://dx.doi.org/10.3745/kipstc.2011.18c.3.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Han, Cheng Hao, Ye Ren, and Bing Shang. "Wireless Identification System Based on Radio Frequency Technique." Advanced Materials Research 433-440 (January 2012): 6760–63. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.6760.

Full text
Abstract:
Using radio frequency technique, the reader machine will load call signal into 70MHz radio frequency, and send to response machine wirelessly. The call signal will be sent to the control of response machine by circuit coupling, demodulation, voltage comparator. The control will analyze and identify the call signal, send the stored 4-bit binary code back to the reader machine by transmitting modulation circuit, and display the detail of response machine.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhou, Li Bo, Fu Lin Xu, and Zhi Xiong Shen. "Research of Virtual Assembly Simulation System." Applied Mechanics and Materials 628 (September 2014): 421–25. http://dx.doi.org/10.4028/www.scientific.net/amm.628.421.

Full text
Abstract:
Virtual assembly is one of the main contents of the virtual manufacturing; assembly process simulation is an important part to product virtual assembly. The establishment and optimization technology of three-dimensional assembly simulation scene have been studied to develop a virtual machine assembly simulation system, which achieve a virtual simulation of assembly and disassembly of the machine and the integration and improvement of existing collision detection library, design and implement a graphical simulation system collision detection module, which can real-time interference checking to machine parts motion. The system has good human-computer interaction and visual interface, versatility, can be applied to any organization's assembly simulation, and through examples of the validity of the system.
APA, Harvard, Vancouver, ISO, and other styles
21

Sarimbekov, Aibek, Andreas Sewe, Walter Binder, Philippe Moret, and Mira Mezini. "JP2: Call-site aware calling context profiling for the Java Virtual Machine." Science of Computer Programming 79 (January 2014): 146–57. http://dx.doi.org/10.1016/j.scico.2011.11.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Fan, Li Xian, Yong Zhao Xu, and Hong Tao Li. "Design and Realization of Virtual Computer Cluster System." Advanced Materials Research 271-273 (July 2011): 1313–17. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1313.

Full text
Abstract:
Virtualization technology has revolted the computer technology. In the paper, we present our virtual computer cluster. The components of computer cluster have been improved by virtualization technology from the actual computer server to virtual server instance. Virtual computer cluster includes front-end machine and the cluster nodes. The front-end machine can be physical machines or virtual machines; the cluster node can also be virtual or physical machine node. The front-end machine of the cluster communicates with the cluster nodes through physical or virtual network adapter. The front-end machine connects with the cluster management software in each node so as to monitor and control every physical or virtual node within the cluster. A single virtual computer cluster extends its resources with adding physical or virtual resources including computing resources, storage resources and etc. within secure and stabile occasions with special needs. The technology can be widely applied to cluster and parallel computing demand but with lower-cost system design scenarios.
APA, Harvard, Vancouver, ISO, and other styles
23

Kumar, Gaurav, Smriti Gupta, Divya Agarwal, and Astha Tiwari. "Virtual Voting System." International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) 2, no. 1 (June 25, 2020): 77–82. http://dx.doi.org/10.34010/injiiscom.v2i1.5416.

Full text
Abstract:
India's voting system plays an important role in Indian Democracy. The existing system is offline and has certain weaknesses. In recent years, the spread of covid19, inefficient rural voters, people far from their place of birth, paper waste affecting nature, budgets that should be used for development, invisible fraud, waste of human labor, have been recorded and can be avoided by the virtual voting system. The research aims to supply an easy and secure electoral system in India. The method used descriptive qualitative. The results indicate that a virtual voting system is environmentally friendly and is considered a resource-saving way for the election. It is because minimizes errors and increases voter participation through convenient virtual voting. In conclusion, a virtual voting system can develop an Aadhar based advanced Electronic Voting Machine (EVM), which helps in a free and fair way of conducting elections
APA, Harvard, Vancouver, ISO, and other styles
24

Salapura, Valentina, and Rick Harper. "Virtual Machine Resiliency Management System for the Cloud." IEEE Cloud Computing 5, no. 3 (May 2018): 55–64. http://dx.doi.org/10.1109/mcc.2018.032591617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sui, Xiu Lin, Zheng Wei Kong, Jia Tai Zhang, and Xiao Ping Yang. "Study of Virtual Numerical Control Milling Simulation System." Key Engineering Materials 407-408 (February 2009): 174–79. http://dx.doi.org/10.4028/www.scientific.net/kem.407-408.174.

Full text
Abstract:
Virtual numerical control milling simulation system, based on UG, is studied oriented to low utilization of NC machines. A virtual machine tools library, standard fixture library and visual machine tool processing environment were established by the second development techniques of UG and VC++. Through the example of XH715 NC machine center, tool path and motion of miller were simulated separately; at last processing scheme was evaluated and optimized. The experimental results show this system possesses good utility, and the utilization of machine tools could thus be improved.
APA, Harvard, Vancouver, ISO, and other styles
26

Li, Jing, Shan Shan Bai, Yi Long Wang, Ping Xi, and Bing Yi Li. "Design of Virtual Machine Assembly Simulation System in Single-Channel Immersion." Key Engineering Materials 620 (August 2014): 556–62. http://dx.doi.org/10.4028/www.scientific.net/kem.620.556.

Full text
Abstract:
The virtual reality technology has been widely applied in virtual manufacturing; virtual environment which integrated with visual, auditory and tactile can be established. In this paper, a single - channel immersion machine assembly simulation system was built by EON Studio of virtual reality software and virtual peripherals. For building immersion virtual environment, three dimensional entity model of machine was established by the CATIA software, rendering and coloring it through the 3ds Max, inputting interface of EON convert file. Researching on interactive virtual assembly technology of machine was done, two interactive methods were developed through the keyboard ,mouse and other input devices or data glove ,(Flock and Bird) and other virtual peripherals respectively: one was to realize the interaction based on keyboard by the triggering sensor node, event driven and routing mechanism ; another was established the virtual hand, achieving the spatial position of manpower through driving virtual hand by data glove and (Flock and Bird) , and converted it into the position of virtual hand in virtual space, to complete the grasping, moving, releasing the object operation in immersion virtual environment, so that completing the virtual machine assembly, assembly trajectory visualization was realized, the basis was provided for the path of assembly analysis. The human-computer interface of assembly simulation system of machine develop, each module integration was realized by the transmission of information between EON Studio and machine, and reasonable guidelines for machine assembly training was provided.
APA, Harvard, Vancouver, ISO, and other styles
27

Nissim, Nir, Yuval Lapidot, Aviad Cohen, and Yuval Elovici. "Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining." Knowledge-Based Systems 153 (August 2018): 147–75. http://dx.doi.org/10.1016/j.knosys.2018.04.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Rong-Shean, and Ko-Jen Mei. "Motion and Virtual Cutting Simulation System for a Five-Axis Virtual Machine Tool." International Journal of Automation and Smart Technology 1, no. 1 (September 1, 2011): 35–39. http://dx.doi.org/10.5875/ausmt.v1i1.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ahn, Duk-Ki, Chang-Hwan Yi, and Se-Man Oh. "Executing System of Virtual Machine Code using Decompiling Method." KIPS Transactions:PartA 14A, no. 2 (April 30, 2007): 91–98. http://dx.doi.org/10.3745/kipsta.2007.14-a.2.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tezuka, Tetsuo, Ken-ichiro Kashiwa, Takuya Mitani, and Hidekazu Yoshikawa. "Development of Machine-Maintenance Training System in Virtual Environment." IFAC Proceedings Volumes 28, no. 15 (June 1995): 687–92. http://dx.doi.org/10.1016/s1474-6670(17)45312-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Scheifele, Stefan, and Alexander Verl. "Automated Control System Generation Out of the Virtual Machine." Procedia Technology 26 (2016): 349–56. http://dx.doi.org/10.1016/j.protcy.2016.08.045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Theissen, Nikolas, Theodoros Laspas, Károly Szipka, and Andreas Archenti. "Virtual machining system simulator: analysis of machine tool accuracy." Procedia Manufacturing 25 (2018): 338–43. http://dx.doi.org/10.1016/j.promfg.2018.06.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Lizhe, Marcel Kunze, and Jie Tao. "Performance evaluation of virtual machine-based Grid workflow system." Concurrency and Computation: Practice and Experience 20, no. 15 (October 2008): 1759–71. http://dx.doi.org/10.1002/cpe.1328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Itabashi, Kazumasa, Katsuya Matsubara, Yutaka Moriyama, Yuuichi Someya, Kazuhiko Kato, Tatsuro Sekiguchi, and Akinori Yonezawa. "Implementing an applet system without fixing virtual-machine designs." Systems and Computers in Japan 34, no. 2 (January 24, 2003): 32–42. http://dx.doi.org/10.1002/scj.10013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Brindha Devi, V., S. Sindhuja, S. Shanthini, and M. Hemalatha. "A virtual keyboard security system for automated teller machine." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.33.13855.

Full text
Abstract:
The Automated Teller Machines (ATM) are used for cash withdrawals. Meanwhile as ATM lacks security, thefts occurring in the ATMs are also high. Our proposed system minimizes those break-ins occurring in the ATM’s by instigating a low cost standalone embedded sys-tem using Arduino Microcontroller. This system is proposed for ATM security, comprising of the components namely RGB tag, Global System for Mobile communication (GSM), Global Positioning System (GPS), Virtual Keyboard and camera. Authentication by virtual keyboard thus helps the public to protect their credentials from being captured by malicious bots, key loggers and spyware. Whenever theft occurs, Buzzer makes an alarm, DC Motor turns ON and the door of ATM is closed. The nearby police station and corresponding bank authorities is alerted by the GSM Modem that sends messages along with the location. This will prevent the robberies and the person in-volving in the robbery can be easily caught. In short, it discusses the methods that are used to detect the venture, initiate preemptive measures and forewarn the officials through GSM network. This system thus heightens the safety of ATM users as well as the ATM’s against forthcoming attacks effectively.
APA, Harvard, Vancouver, ISO, and other styles
36

Kadle, Keyur. "Virtual Reality based Stress Relief System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 2335–39. http://dx.doi.org/10.22214/ijraset.2021.34529.

Full text
Abstract:
With the ascent of modern technology, the call for constant connectivity has led to growing physical and mental health concerns among the general masses. This inter connectivity has overwhelmed the populace with no room for relief. The objective of this project is to emulate environments and scenarios of the user’s choosing through the use of mobile and dedicated virtual reality systems. These systems present an audio visual experience to the users with the added benefits of interactivity and immersion that become possible by using Virtual Reality as the base technology. These emulated environments are constructed to calm the user and help to immerse the user within these environments to calm the user in a stressful environment
APA, Harvard, Vancouver, ISO, and other styles
37

Budijono, Santoso, and Robby Saleh. "Penggunaan Virtual Machine dalam Pembelajaran Jaringan." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 495. http://dx.doi.org/10.21512/comtech.v5i1.2643.

Full text
Abstract:
Computer Networks is an important course as a basis in computer science. This is because at this time all activities are associated with the use of network system or communication system. In the course of learning in Computer Networks, students are often difficult to understand network concepts, especially with many layman terms for students. The term IP, Subnet Mask, Gateway, and Router are the terms widely used in network. To better understand the use of the IP, Subnet Mask, Gateway, and Router, it should be given concrete examples of the application day-to-day. Such as setting the IP, Subnet, Gateway, and Router on a PC connected to the network, it is hoped that students can quickly understand. This prototype used some Virtual Machines considered to represent the need for the creation of multiple virtual machines in one computer. The resulting prototype is expected to be useful in learning the Networking matter in Computer Networks subject. Research successfully created 2 Virtual Machines in 1 computer, with the network in both Virtual Machines isolated and not connected to the Internet.
APA, Harvard, Vancouver, ISO, and other styles
38

Liaw, Heh-Tyan, Ay-Hwa Andy Liou, and Shang Huang. "Applying the framework of Turing machine developing system for implementing Java virtual machine." Journal of Computational Methods in Sciences and Engineering 12, s1 (November 5, 2012): S161—S168. http://dx.doi.org/10.3233/jcm-2012-0446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Torres, Gildo, and Chen Liu. "Adaptive Virtual Machine Management in the Cloud." International Journal of Systems and Service-Oriented Engineering 4, no. 2 (April 2014): 28–43. http://dx.doi.org/10.4018/ijssoe.2014040103.

Full text
Abstract:
The success of cloud computing technologies heavily depends on both the underlying hardware and system software support for virtualization. In this study, we propose to elevate the capability of the hypervisor to monitor and manage co-running virtual machines (VMs) by capturing their dynamic behavior at runtime and adaptively schedule and migrate VMs across cores to minimize contention on system resources hence maximize the system throughput. Implemented at the hypervisor level, our proposed scheme does not require any changes or adjustments to the VMs themselves or the applications running inside them, and minimal changes to the host OS. It also does not require any changes to existing hardware structures. These facts reduce the complexity of our approach and improve portability at the same time. The main intuition behind our approach is that because the host OS schedules entire virtual machines, it loses sight of the processes and threads that are running within the VMs; it only sees the averaged resource demands from the past time slice. In our design, we sought to recreate some of this low level information by using performance counters and simple virtual machine introspection techniques. We implemented an initial prototype on the Kernel Virtual Machine (KVM) and our experimental results show the presented approach is of great potential to improve the overall system throughput in the Cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Jannarm, D., and T. Kaewkiriya. "Framework of Dynamic Resource Allocation System for Virtual Machine in Virtualization System." International Journal of Computer Theory and Engineering 8, no. 4 (August 2016): 299–302. http://dx.doi.org/10.7763/ijcte.2016.v8.1062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cheng, Jun, Ya Dong Gong, and Yue Ming Liu. "Investigation on Key Technology of Virtual Assembly and Construction for Tunnel Boring Machine." Applied Mechanics and Materials 71-78 (July 2011): 3375–78. http://dx.doi.org/10.4028/www.scientific.net/amm.71-78.3375.

Full text
Abstract:
This study presents a practical requirement and realizes one new virtual construction interactive system for tunnel boring machine. One type of TBM(tunnel boring machine)’s virtual prototype has been built. Software PROE is used to build the shield machine model. Application program of virtual assembly system base on virtual reality is developed by using Division, The author also study on key technologies of constructing virtual assembly system of shield machine, such as interference detection in virtual environment. Application program of virtual simulation system base on virtual reality is developed by using C++. The result shows that the work station can be simulated well, and this virtual simulation system can be extended in virtual training and manipulation, virtual construction and so on.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Qi, Qing Ming Wang, and Xiao Feng Zhang. "A Real Electronic System to Control Virtual Machine in NC Machining Simulation." Applied Mechanics and Materials 226-228 (November 2012): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.226-228.2203.

Full text
Abstract:
In this study, a system composed of real electrical communication system and virtual machine part has been used on NC machining simulation. By establishing a interface based on socket protocol, communication is established between real CNC systems and virtual machine tools. So, processing information of CNC system can be accurately passed to the virtual machine tools. Virtual machine is driven to work in accordance with the instructions of the CNC system. Experiments show that the system is steady and process is repeatable. With structure diagram of communication based on socket protocol shown, the system can be used to detect the manufacturability of the product design process or debug the electrical equipments more efficiently at low cost. It’s also helpful in testing the reliability of NC code in virtual machining.
APA, Harvard, Vancouver, ISO, and other styles
43

Si, Zhan Jun, Wen Xia Li, and Chong Gu. "Research of Printing Machine Simulation System Based on Virtual Reality." Applied Mechanics and Materials 731 (January 2015): 420–25. http://dx.doi.org/10.4028/www.scientific.net/amm.731.420.

Full text
Abstract:
According to complex structure, long production cycle, low efficiency and high training cost of printing machine, the printing machine motion simulation system based on virtual reality is presented. The system used J2205 as the research object and needed Solidworks mechanical modeling software to build 3D models and assemble into the printing machine. Then the assembly was imported into 3Dsmax to map, render and make animation. Through Virtools_Max_Exporter plug-in the digital model was saved as nmo format. After analyzing dynamics principle of printing machine parts, we used script language and the corresponding algorithm provided by Virtools to realize interaction and motion simulation. At last, the system was exported as exe format which can run without Virtools environment. The system realizes the application of Virtools in mechanical industry. Users can 360°view the printing machine, the assembly and printing process. It has an important significance in printing industry, education and training.
APA, Harvard, Vancouver, ISO, and other styles
44

Son, Sung Hoon. "Design of Virtual Machine Monitor for Embedded Systems." Applied Mechanics and Materials 263-266 (December 2012): 1629–32. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1629.

Full text
Abstract:
Recently virtualization has been one of the most popular research topics in system software area. While there are many commercial virtualization products for general-purpose computer system, little efforts are made to virtualize embedded system. In this paper, we design and implement a virtual machine monitor which divides each physical hardware resource of an embedded system into logical ones and reorganizes them into many virtual machines so that several real-time operating systems run concurrently on a single embedded system. We measure various performance metrics of the virtual machine monitor developed on a real embedded system. The results of the measurement study show that our virtual machine monitor has enough potentiality of its application to real-world embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Gang, Yan Cao, Yu Yao, and Wan Shan Wang. "A Desktop Virtual Reality-Based Interactive Tunnel Boring Machine Simulation System." Advanced Materials Research 139-141 (October 2010): 957–60. http://dx.doi.org/10.4028/www.scientific.net/amr.139-141.957.

Full text
Abstract:
In this paper, we present the design and implementation of a VRML multi-user layer, which is introduced in the virtual reality platform. A novel 3D simulation system supporting tunnel boring machine (TBM) design is developed. The virtual environment (VE) of the TBM is established by VRML based on virtual reality technology, the 3D assembling model is built by Solidworks software and changed into the virtual environment by VRML format. The optimal method is put forward by three steps optimization data to realize transmission of network. The motion simulation and virtual assembly program for TBM are made by VRML/Java language with the movement simulation control function to realize motion simulation. It has the advantages of free installation, authenticity, interactivity, low-cost, portability, and low requiring for the clients and so on.
APA, Harvard, Vancouver, ISO, and other styles
46

Nian, Shan Po, Lei Chen, Cai Xia Hou, Run Kun Gong, and Li Peng. "Research of Virtual Emotional Human System Based on Artificial Life." Applied Mechanics and Materials 325-326 (June 2013): 1792–95. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1792.

Full text
Abstract:
t is the task for artificial intelligence to give human intelligence to machine, such as thinking, reasoning and deciding, etc. To give life to a machine is the research fields of artificial life like evolution, generating, self-adaptation, self-organization, etc. Artificial emotion gives a machine various senses as laughing, anger, sorrow and happiness, etc. It is intolerable for artificial emotion to be separated from artificial life. So the research frame of the virtual emotional human system is represented. And the emotional model, method and technology are investigated in this paper. A simulation has been done. The results are encouraging and it will be applied into the interface between human and machine.
APA, Harvard, Vancouver, ISO, and other styles
47

Jo, Heeseung, Jinkyu Jeong, Myoungho Lee, and Dong Hoon Choi. "Exploiting GPUs in Virtual Machine for BioCloud." BioMed Research International 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/939460.

Full text
Abstract:
Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
48

Hu, Q. N., D. J. Feng, H. Shu, H. Z. Dai, and J. L. Wu. "Research on Machining Virtual Reality System." Key Engineering Materials 546 (March 2013): 70–75. http://dx.doi.org/10.4028/www.scientific.net/kem.546.70.

Full text
Abstract:
A machining virtual reality system is established by studying the operating procedure of machining. The modeling and optimization method of scene model is put forward. Two different roaming ways, that is the automatic roaming path and the free roaming path, are designed. The process of machine and the operation of virtual worker are simulated based on the technique of modular programming and collision detection in Virtools, enhancing the sense of immersion and reality of the virtual machining process. The system provides a new method for machining experimental instruction.
APA, Harvard, Vancouver, ISO, and other styles
49

Vorkapić, Nikola, Saša Živanović, Zoran Dimić, Branko Kokotović, and Nikola Slavković. "Virtual horizontal machining center LOLA HBG 80 for program verification and monitoring." FME Transactions 49, no. 3 (2021): 696–703. http://dx.doi.org/10.5937/fme2103696v.

Full text
Abstract:
This paper describes configuring the virtual horizontal machining center LOLA HBG80 within the programming and verification system and the open architecture control system. The horizontal machining center LOLA HBG 80 is represented by an equivalent virtual machine in a CAD/CAM environment (PTC Creo and Catia), STEP-NC Machine environment, and the control system. Virtual simulation is essential for machining, and the developed virtual machines are used for program verification and monitoring of the machining process. The virtual machine in the programming system allows the verification of the program before sending it to the real machine and includes verification of the tool path (CLF-Cutter Location File) and G-code. The paper also discusses the possibility of applying a new programming method known as STEP-NC and preparing an adequate environment that includes a virtual machine. The virtual machine in the control system represents the last level for the final program verification and the process monitoring system.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhao, Xun, Yang Zhang, Yongwei Wu, Kang Chen, Jinlei Jiang, and Keqin Li. "Liquid: A Scalable Deduplication File System for Virtual Machine Images." IEEE Transactions on Parallel and Distributed Systems 25, no. 5 (May 2014): 1257–66. http://dx.doi.org/10.1109/tpds.2013.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography