The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this letter, we study the construction of quasi-cyclic (QC) low-density parity-check (LDPC) codes by array dispersion and masking. We first propose a class of arrays of circulant permutation matrices (CPMs) of arbitrary size obtained by dispersion. Based on this class of arrays of CPMs, a class of QC-LDPC codes is constructed. For these resulting codes, we analyze their cycle structure and derive...
NAND flash memory has been widely used as storage medium in diverse environments due to its light weight, low power consumption, and high I/O performance. Page replacement is an important operation in NAND flash- based storage systems. However, traditional replacement algorithms designed for magnetic disks fail to meet the needs of NAND flash memory due to inherent features such as asymmetric I/O...
Modern solid state disk (SSD) has a buffer (SDRAM), which is used to store commonly used data and map in the near future. How to efficient management of this buffer is an important things of improving performance of SSD. Flash read and write speed have asymmetric characteristic. SSD buffer management algorithms must consider this characteristic of flash. Current page mapping SSD buffer management...
Base station (BS) location privacy has been widely studied and researched in different applications like field monitoring, agriculture, industry and military etc. The purpose is to hide the location of BS from outside/inside attacker in any shape. Hundreds of thousands of sensor nodes are deployed in some area, bring lot of new challenges regarding routing, forwarding, scaling and security. Different...
Flash-based Solid State Drive (SSD) has limitations in terms of cost and lifetime. It is used as a second-level cache between main memory and traditional HDD-based storage widely. Adopting traditional cache algorithms, which are designed primarily depending on temporal locality and popular blocks, to SSD-based second-level disk cache can cause unnecessary cache replacements, which not only degrade...
Solid state drives (SSDs) are rapidly growing used in both personal computer and enterprise server area in the past several years. Compare with traditional hard disk drive, the advantages of SSDs are great performance, small size and shock resistance. However, SSDs suffer from obvious performance dropping when free physical pages become lacking, after plenty of data writing. Because time-consuming...
This paper is motivated by our three key observations: (1) there exists a degradation of performance as the interleaved accesses of heterogeneous streams, (2) for the slow stream, sequential accesses suffer huge misses in the prefetching cache, (3) in concurrence paradigm, providing fairness and QoS to concurrent streams is very important which always ignored by the traditional prefetching algorithms...
The increasing popularity of flash memory has changed storage systems. Flash-based solid state drive(SSD) is now widely deployed as cache for magnetic hard disk drives(HDD) to speed up data intensive applications. However, existing cache algorithms focus exclusively on performance improvements and ignore the write endurance of SSD. In this paper, we proposed a novel cache management algorithm for...
To extract the target location correctly in PHD based multi-target tracking algorithm, an improved peak extraction algorithm was proposed. This new algorithm stemmed from the CLEAN technique in radar signal processing. By finding the highest peak in every iteration, the assumed target was extracted and its corresponding location information was obtained. Simulation results prove the efficiency and...
To get large disk-like characteristics and offset the significant power demands of hard disk drives, we propose a fully functional hybrid archive system (called Pseudodisk) composed of an array of disks and a tape library. To get an energy conservation, low cost archive system, Pseudodisk uses data value model and utility function to guild data management. Two novel algorithms are proposed for data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.