The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of cloud computing, disk arrays tolerating triple disk failures (3DFTs) are receiving more attention nowadays because they can provide high data reliability with low monetary cost. However, a challenging issue in these arrays is how to efficiently reconstruct the lost data, especially for partial stripe errors (e.g., sector and chunk errors). It is one of the most significant...
In large scale data centers, with the increasing amount of user data, Triple Disk Failure Tolerant arrays (3DFTs) gain much popularity due to their high reliability and low monetary cost. With the development of cloud computing, scalability becomes a challenging issue for disk arrays like 3DFTs. Although previous solutions improves the efficiency of RAID scaling, they suffer many problems (high I/O...
In this paper, we report the positive bias temperature instability (PBTI) effects of the back-gated MoS2 n-MOSFET with Al2O3 gate dielectric. Multilayer MoS2 was used and all measurements are carried in vacuum to avoid the electric signal contamination by the top MoS2 surface water or oxygen molecules absorption. In the stress phase, the Id-Vg curve shifts to the positive gate bias direction. In the...
Cooperative spectrum sensing(CSS) can effectively improve sensing accuracy and suppress channel fading effects. But it can be threatened by malicious users (MUs). MUs may try to forge sensing results to indicate that the primary user exists even when there is no primary user(PU). So MUs can monopolize the spectrum usage, thereby depriving other users of their spectrum opportunities. Based on a more...
This paper reports on the development of packaging technology for the assembly of 30µm pitch micro Cu pillar bump (15µm diameter) on organic FCCSP substrate having bare Cu bondpad without NiAu or OSP surface protection. The assembly was performed by thermal compression bonding (TCB) with non-conductive paste (NCP). Finite element modeling and simulation were carried out to understand the Cu pillar...
The costly explicit and implicit acknowledgements (ACKs) are issues that need to be addressed in the existing reliability aware flooding algorithms. This research focuses on energy efficiency on both data transmission and ACKs, while achieving target reliability and balancing the residual energy of sensor nodes. A correlation-based probabilistic flooding algorithm (CPFA) is proposed. It exploits the...
This paper proposes a new procedure for simulation of random wind velocity field with only a few random variables. The procedure starts with decomposing the random wind velocity field into a product of a stochastic process and a random field, which represent the time property and spatial correlation property of the wind velocity fluctuation respectively. Then the stochastic process for wind velocity...
Nowadays RAID is widely used due to its large capacity, high performance and high reliability. With the increasing requirement of reliability in storage systems and fast development of cloud computing, RAID-6, which can tolerate concurrent failures of any two disks, receives more attention than ever. However, the write performance of RAID-6 systems is a bottleneck to serve various applications. In...
With the rapid growth of data storage, the demand for high reliability becomes critical in large data centers where RAID-5 is widely used. However, the disk failure rate increases sharply after some usage, and thus concurrent disk failures are not rare, therefore RAID-5 is insufficient to provide high reliability. A solution is to convert an existing RAID-5 to a RAID-6 (a type of "RAID level...
In large storage systems, erasure codes is a primary technique to provide high reliability with low monetary cost. Among various erasure codes, a major category called XORbased codes uses purely XOR operations to generate redundant data and offer low computational complexity. These codes are conventionally implemented via matrix based method or several specialized non-matrix based methods. However,...
With the rapid expansion of data storages and the increasing risk of data failures, triple Disk Failure Tolerant arrays (3DFTs) become popular and widely used. They achieve high fault tolerance via erasure codes. One class of erasure codes called Maximum Distance Separable (MDS) codes, which aims to offer data protection with minimal storage overhead, is a typical choice to enhance the reliability...
This paper describes a new reliable transport protocol designed to run on top of a multicast network service for delivery of continuously generated files. The motivation for this work is to support scientific computing Grid applications that require file transfers between geographically distributed data enters. For example, atmospheric research scientists at various universities subscribe to real-time...
The anti-pyramid stacked chips distribution that can be applied in SIP is reported to have a much better thermal performance comparing to the widely used pyramid distribution. When the package of system is using PCB and LTCC condition, the highest temperature is brought down from 440°K to 417°K and from 326°K to 319°K respectively. In addition, it is also analyzed that the anti-pyramid distribution...
The purpose of this paper is to study the influences of technological, organizational and environmental factors on the acceptance of RFID in China based on the technology-organization-environment framework. The concept of RFID acceptance is defined as a psychological status to intend to use RFID. The data came from a questionnaire survey in China, and 144 samples were analyzed. The analysis shows...
Reliability is one of the key issues that electric power communication network will focus on. In this paper, an efficient RBD-based algorithm for reliability analysis of electric power communication network is introduced. The object-oriented analysis and design with UML of the algorithm is presented. The implementation result using visual C# programming language is given as well. The evaluation of...
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly related...
With the development of wind energy and power electric control technology, more wind farms with variable speed wind turbine systems (VSWTS) are integrated into power grids. While VSWTSs improve the stability and power quality of systems, several new problems are introduced in power grid. This paper provides an overview to the relevant latest research issues related to the integration of wind farms...
The three-element hydraulic converter as subject is investigated, dynamic mathematics model is established, and formulas of transfer function are deduced. The tests of hydraulic converter for gaining transfer function and dynamic characteristics are performed by using dSPACE real-time control system on the dynamic simulation test-bed. Thus the accurate and applied 4steps dynamic model of hydraulic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.