• Title/Summary/Keyword: Virtual Machines

Search Result 239, Processing Time 0.028 seconds

Force Synchronizing Control for 4 Axes Driven Hydraulic Cylinder-Clamping Load Systems (4축 구동 유압실린더-클램핑 부하 시스템의 힘 동기제어)

  • Cho, S.H.
    • Journal of Drive and Control
    • /
    • v.11 no.2
    • /
    • pp.9-15
    • /
    • 2014
  • This paper deals with the issue of force synchronizing control for the clamping servomechanism of injection molding machines. Prior to the controller design, a virtual design model has been developed for the clamping mechanism with hydraulic systems. Then, a synchronizing controller is designed and combined with an adaptive feedforward control in order to accommodate the mismatches between the real plant and the linear model plant used. As a disturbance, the leakage due to the ring gap with relative motion in the cylinder has been introduced. From the robust force tracking simulations, it is shown that a significant reduction in the force synchronizing error is achieved through the use of a proposed control scheme.

Finite Element Analysis and Dynamics Simulation of Mechanical Flux-Varying PM Machines with Auto-Rotary PMs

  • Huang, Chaozhi;Zhang, Zhixuan;Liu, Xiping;Xiao, Juanjuan;Xu, Hui
    • Journal of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.744-750
    • /
    • 2019
  • A new type of auto-rotary PM mechanical flux-varying PM machine (ARPMMFVPMM) is proposed in this paper, which can overcome the problem where the air-gap magnetic field of a PM machine is difficult to freely adjust. The topology structures of the machine and the mechanical flux-adjusting device are given. In addition, the operation principle of flux-adjusting is analyzed in detail. Furthermore, the deformation of a spring with the speed variation is obtained by virtual prototype technology. Electromagnetic characteristics including the flux distribution, air gap flux density, flux linkage, electromagnetic-magnetic-force (EMF), and flux weakening ability are computed by 2D finite element method (FEM). Results show that the machine has some advantages such as the good field control ability.

Examining Portraits in Digital Fashion Art Non-Fungible Tokens (NFTs) through Baudrillard's Simulation

  • Yoon Kyung Lee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.47 no.5
    • /
    • pp.929-942
    • /
    • 2023
  • Web 3.0 enables people and machines to connect, evolve, share, and use knowledge on an unprecedented scale and in new ways, drastically improving our Internet experience. The metaverse is a collective, virtual shared space supporting all digital activities. Prompted by the rapid growth of digital art and digital fashion, this theoretical analysis explores using Jean Baudrillard's simulation concept to create unique digital art non-fungible tokens (NFTs), allowing them to express and communicate ideas like real-world art. Specifically, this study analyzes 120 digital fashion portraits of humans and animals and classifies them under three types of simulacra covering four stages of Baudrillard's simulation process. The result shows that NFT fashion artworks reflect the core features of a digital reality by connecting and transcending the boundaries of cultures, genders, and nationalities. However, in the final simulation stage (the fourth step), the simulacrum can only coexist in the virtual world as a hyperreal object (the Type III of simulacrum): an object more real than reality.

A Study on Defense Technique Against Use-After-Free Attacks Using MTE (MTE 를 활용한 사용 후 해제 공격 방어기법 연구)

  • Yunseong Hwang;Junseung You;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.279-282
    • /
    • 2024
  • The Use-after-free (UAF) bug is a long-standing temporal memory safety issue. To prevent UAF attacks, two commonly used approaches are lock-and-key and pointer nullification. Recently, ARM architecture supports the Memory Tagging Extension (MTE) that implemented a lock-and-key mechanism using a 4-bit tag during memory access. Previous research proposed a virtual address tagging scheme utilizing MTE to prevent UAF attacks. In this paper, we aimed to measure a simplified version of the previously proposed virtual address tagging scheme on real machines supporting MTE by implementing a simple module and conducting experiments.

Design and Implementation of a Virtual Machine for Embedded Systems (임베디드 시스템을 위한 가상기계의 설계 및 구현)

  • Oh Se-Man;Ko Kwang-Man;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1282-1291
    • /
    • 2005
  • This paper presents the EVM(Embedded Virtual Machine) which enables the execution of dynamic applications loaded in the embedded systems such as Mobile Devices(mobile phone, PDA), Set-Top Box, and Digital TV using downloading techniques. To accomplish this goal, we defined a SIL-(Standard Intermediate Language) code, and implemented a Bytecode-to-SIL translator which enables the execution of programs written in java language in the EVM platform without JVM, and a MSIL--to-SIL- translator which enables for programs written in .NET language to be executed in the EVM platform without .NET platform. Also, we developed a EFF(Executable File Format) builder as an assembler which translates SIL codes into an executable file, *.evm, and implemented the EVM which reads the *.evm file and executes it. The virtual machine for embedded systems developed in this paper is the software technologies that enable the execution of applications or contents without changes to when the platforms change. In fact, the virtual machine suggested here is not only usable as a standard model for existing virtual machines but also aid in more efficient execution of applications loaded in the embedded systems such as Mobile Devices, Digital TV, and Set-Top Box.

  • PDF

Virtual Flutter Plight Test of a Full Configuration Aircraft with Pylon/External Stores

  • Kim, Dong-Hyun;Kwon, Hyuk-Jun;Lee, In;Paek, Seung-Kil
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.4 no.1
    • /
    • pp.34-44
    • /
    • 2003
  • An advanced aeroelastic analysis using a computational structural dynamics (CSD), finite element method (FEM) and computational fluid dynamics (CFD) is presented in this Paper. A general aeroelastic analysis system is originally developed and applied to realistic design problems in the transonic flow region, where strong shock wave interactions exist. The present computational approach is based on the modal-based coupled nonlinear analysis with the matched-point concept and adopts the high-speed parallel processing technique on the low-cost network based PC-clustered machines. It can give very accurate and useful engineering data on the structural dynamic design of advanced flight vehicles. For the nonlinear unsteady aerodynamics in high transonic flow region, Euler equations using the unstructured grid system have been applied to easily consider complex configurations. It is typically shown that the advanced numerical approach can give very realistic and practical results for design engineers and safe flight tests. One can find that the present study conducts a virtual flutter flight test which are usually very dangerous in reality.

Priority-based Hint Management Scheme for Improving Page Sharing Opportunity of Virtual Machines (가상머신의 페이지 공유 기회를 향상시키기 위한 우선순위 큐 기반 힌트 관리 기법)

  • Nam, Yeji;Lee, Minho;Lee, Dongwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.947-952
    • /
    • 2016
  • Most data centers attempt to consolidate servers using virtualization technology to efficiently utilize limited physical resources. Moreover, virtualized systems have commonly adopted contents-based page sharing mechanism for page deduplication among virtual machines (VMs). However, previous page sharing schemes are limited by the inability to effectively manage accumulated hints which mean sharable pages in stack. In this paper, we propose a priority-based hint management scheme to efficiently manage accumulated hints, which are sent from guest to host for improving page sharing opportunity in virtualized systems. Experimental results show that our scheme removes pages with low sharing potential, as compared with the previous schemes, by efficiently managing the accumulated pages.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation (가상화 기반 난독화 및 역난독화를 위한 코드 자동 분석 기술)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.724-731
    • /
    • 2018
  • Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.

VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment

  • Supreeth, S.;Patil, Kirankumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1892-1912
    • /
    • 2022
  • With the massive demand and growth of cloud computing, virtualization plays an important role in providing services to end-users efficiently. However, with the increase in services over Cloud Computing, it is becoming more challenging to manage and run multiple Virtual Machines (VMs) in Cloud Computing because of excessive power consumption. It is thus important to overcome these challenges by adopting an efficient technique to manage and monitor the status of VMs in a cloud environment. Reduction of power/energy consumption can be done by managing VMs more effectively in the datacenters of the cloud environment by switching between the active and inactive states of a VM. As a result, energy consumption reduces carbon emissions, leading to green cloud computing. The proposed Efficient Dynamic VM Scheduling approach minimizes Service Level Agreement (SLA) violations and manages VM migration by lowering the energy consumption effectively along with the balanced load. In the proposed work, VM Scheduling for Efficient Dynamically Migrated VM (VMS-EDMVM) approach first detects the over-utilized host using the Modified Weighted Linear Regression (MWLR) algorithm and along with the dynamic utilization model for an underutilized host. Maximum Power Reduction and Reduced Time (MPRRT) approach has been developed for the VM selection followed by a two-phase Best-Fit CPU, BW (BFCB) VM Scheduling mechanism which is simulated in CloudSim based on the adaptive utilization threshold base. The proposed work achieved a Power consumption of 108.45 kWh, and the total SLA violation was 0.1%. The VM migration count was reduced to 2,202 times, revealing better performance as compared to other methods mentioned in this paper.