The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of digitalization, people store their data digitally on local or remote storage. To prevent data loss due to disk failures, data fault tolerance mechanisms have been widely deployed to provide different levels of reliability. However, applying data fault tolerance mechanisms incurs extra cost on storage space and energy consumption. Therefore, data with different importance should be stored...
Nowadays, people rely heavily on local or cloud storage to store their data digitally. To ensure data safety, various data fault tolerance mechanisms have been widely studied and deployed to provide reliability. Data fault tolerance mechanisms incur additional cost to the storage system. Therefore, data of different importance should be stored on storage that provides different levels of fault tolerance...
As the volume of data stored by Big data and Cloud services continues to grow, both academia and industry are seeking for high-performance storage systems. Recently, with the recent advances in write-optimized indexes (WOI), WOI-based file systems can now outperform conventional file systems with orders of magnitude on random writes, metadata updates, and small file creation. Based on the B-tree structure,...
In our previous work, a simulation framework was proposed to focus on imitating the behavior of wireless charging vehicles (WCVs) and wireless sensor networks (WSNs) because current mainstream simulators have very limited support on simulation of WCVs. The WCV is an integration of a mobile vehicle and a wireless power transfer broadcaster, which is used to recharge sensors wirelessly to prolong the...
Non-volatile memory (NVM) has widely participated in the evolution of the next-generation memory architecture by way of being the substitution of the main memory. To cope with the problem of asymmetric read/write speeds of NVM, several excellent researches have been proposed to reduce the number of writes to the NVM-based main memory. Nevertheless, most of these existing approaches do not take the...
In this live demonstration, we would like to present a simulation framework for simulating the behaviors of Wireless Sensor Network (WSN) and Wireless Charging Vehicle (WCV). Different to general purpose WSN simulators, the proposed simulation framework focuses on the simulation of mobile vehicles and wireless power transfer techniques. Besides, the proposed framework provides an easy-to-use user...
Owing to the advanced technology of flexible electronics, flexible touchscreens have become a reality and could by widely deployed on various devices such as mobile phones, wearable devices, and hand-held tablets. Flexible touchscreens not only realize the concept of multi-foldable mobile devices but also significantly change the user experiences due to its flexibility. For instance, when the foldable...
Non-volatile random-access memory (NVRAM) becomes a mainstream storage device in embedded systems due to its favorable features, such as small size, low power consumption, and short read/write latency. On NVRAM, a write operation consumes more energy and time than a read operation. However, current mobile/embedded file systems (e.g., EXT2/3 and EXT4) are very unfriendly for NVRAM devices. The reason...
The growing demands of large capacity flash-based storages have facilitated the down-scaling process of NAND flash memory. Among NAND flash technologies, 3D charge trap flash is regarded as one of the most promising candidates. Owing to the cylindrical geometry of vertical channels, the access performance of each page in one block is distinctive, and this situation is exaggerated in the 3D charge...
A Wireless Sensor Network (WSN) uses a larger number of low-power sensor nodes to gather environmental information which is then wirelessly forwarded to a base station. However, sensor nodes have very limited communication ranges. Thus, relay nodes are required to ensure reliable connectivity throughout the WSN. On the other hand, relay nodes are typically more sophisticated and expensive than sensor...
The lifetime of a sensor network is very important, especially in data-intensive applications, such as military monitoring, the internet of things, and audio/video surveillance, since battery capacity is always limited. Accordingly, the deployments of relay nodes and the configuration of mobile relays in sensor networks have been extensively investigated. Since mobile relays support movement, the...
A Wireless Sensor Network (WSN) uses a large number of low-power sensor nodes and a base station to gather environmental information. However, the topology of WSN cannot always be fully connected owing to the limited communication range of sensor nodes. Therefore, relay nodes are used in the network to ensure reliable connectivity throughout the WSN topology. Since relay nodes are typically more expensive...
Virtualization technology enables multiple virtual machines(VMs) to run on a physical mechanism. Due to the excessive data-intensive workloads of VMs, the system I/O performance of cloud platforms deteriorates. To improve the system I/O performance, one key technique is to exploit the spatial locality of data stored on the back-end disks. However, identifying data spatial locality on a cloud platform...
Sensor devices have been widely applied to variety applications, including internet of things (IoT), cyber physical systems (CPS) and environmental monitoring systems. Because all sensing data in such applications are very important for data analysis and mining in a host machine, sensor devices are equipped with non-volatile memory (NVM) [1] and nonvolatile processor [2], [3] to prevent sensing data...
A Wireless Sensor Network (WSN) is composed by a larger number of low-power sensor nodes to gather environmental information and forward those gathered information wirelessly to a base station. However, due to the limited communication range of sensor nodes, relay nodes need to be included in order to make the whole WSN connected. Relay nodes are typically more advanced and more expensive than sensor...
To resolve the lifetime issue of sensor networks, various solutions, such as mobile-node deployment, energy-efficient routing protocol, and low-power hardware design (e.g., micro processor, small size RAM), have been proposed in modern sensor networks. However, these solutions can only extend the lifetime of sensor networks but cannot achieve immortal sensor networks. Fortunately, an emerging technology...
An emerging breakthrough in wireless charging technology is expected to solve the power constraint problem in wireless sensor networks (WSN). In various works, wireless chargers are being bundled with mobile vehicles to recharge sensor nodes. In these works, simulations of mobile vehicles are typically used in experiments because building a wireless sensor network test bed is very costly and many...
3D NAND has been proposed to provide a large capacity storage with low-cost consideration due to its high density memory architecture. However, 3D NAND needs to consume enormous time for garbage collection because of live-page copying overhead and long block erase time. To alleviate the impact of live-page copying on the performance of 3D NAND, a sub-block erase design has been designed. With sub-block...
Recently, many applications and users rely on cloud storage services, such as Google drive, Dropbox, iCloud and Sky drive, to store private files and system data, and cloud storage services must thus be reliable and secure. To increase reliability, previous studies have proposed a variety of erasure coding algorithms for data fault tolerance for use in storage systems. Although these data fault tolerance...
Unlike a traditional network architecture, a software-defined networking architecture is divided into the control plane and the data plane. Network administrators use the centralized control plane to manage network authority and determine where network traffic is to be sent in the data plane. However, a centralized control structure causes a bottleneck with an overloading flow or under a DDoS attack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.