The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional workload labels such as "archival" and "HPC" are poorly understood and inconsistently applied. As usage of systems has evolved, the language to describe this usage has stagnated. To better understand how workload type translates into system design requirements, we use a combination of longitudinal analysis and statistical feature extraction to categorize workload traces...
Web system technology is rapidly used by most of the users and there has been a speedy change in the technology to access the information in past fifteen years and at the same time it is highly recommended to cope up with the existing and emerging technologies. Metadata are integral part of information and at the same time it is very important to enhance metadata. It is highly recommended that efficient...
In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It...
Metadata snapshots are a common method for gaining insight into file systems due to their small size and relative ease of acquisition. Since they are static, most researchers have used them for relatively simple analyses such as file size distributions and age of files. We hypothesize that it is possible to gain much richer insights into file system and user behavior by clustering features in metadata...
Humans understand media at a high-level of content, that is, we understand media and the message or story it tells us. For instance a surveillance video of a man committing a crime would instantly be differentiated from a video of say a cat chasing a mouse, through its context and meaning to us as human beings. Some types of video data, e.g. films, are made to entertain whereas others are made to...
This paper uses GMDH method to establish a prediction model to forecast the output value of transport & storage of Guangdong in China, since the original samples of the output value of transport & storage are less enough to be used with the traditional methods. Compared with traditional linear regression and artificial neural network, the predicted results show that GMDH method is an effective...
Most Salmonella are considered human pathogens. Meat and chicken transmit this bacterium. Since there is a possibility for transmitting the bacteria by labor instruments and storage area of meat/chicken stores, this research has been performed. To accomplish this, after sampling, samples were cultured on suitable media and identified and finally serology tests were performed. The result showed 2.08%...
By technical-economic calculation of the gas pipeline network, the economic diameter can be determined and the project investment can be saved. According to the principle of value engineering, a mathematical model is constructed for technical-economic calculation of the gas pipeline network. The function of gas pipeline network is analyzed and is divided into four parts: gas transport, gas distribution,...
The wireless network evolution has allowed that the handset technology provides a broad and new set of applications to their users. Several of these applications require DBMS solutions that support their operations. Note, however, that these solutions must respect the limitations of the mobile platform, such as smaller memory capacity and lower processing power. This paper discusses our experience...
Many basic key distribution schemes specifically tuned to wireless sensor networks have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment knowledge of the expected locations of nodes. They have shown that these schemes achieve better performance than the basic schemes, in terms of connectivity,...
Adsorption and separation of the binary mixture of CO2 and CH4 in erionite, mordenite and clinoptilolite are studied through a computer simulation technology-molecular simulation, and the simulation results showed a good agreement with the experimental data. The mechanism for the process was discussed and some conclusions for the process design were made.
In database systems, disk I/O performance is usually the bottleneck of the whole query processing. Among many techniques, compression is one of the most important ones to reduce disk accesses so to improve system performance. RLE (run-length encoding) is one light-weight compression algorithm which incurs negligible CPU cost. A lot of work show that, although RLE is one of the most effective compression...
From the characteristics and advantages of industrial cluster we can see that the cluster is actually a large transportation system. Interlinked with each other on the lower reaches of the integrated enterprise, it contains of product packaging, transportation, handling, storage, custody, as well as what happened in all the process of information management and delivery. Every element of logistics...
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopted scheme in existing P2P storage systems. By properly tunning its parameters, erasure codes can minimize the required data redundancy, which reduces both the storage and the network overheads. However, to perform this optimization,...
The data layout of traditional RAID can't adapt to the heterogeneous RAID that consists of disks with different capacity and/or performance, because it will cause waste of disk storage space and decrease of the integrated disks' bandwidth. Based on the concept of ldquostripe patternrdquo, we bring out the concept of ldquopseudo stripe patternrdquo and propose to place data in heterogeneous RAID with...
A distinct benefit of disk scanning or scrubbing operation is identifying the potential failure sectors as early as possible, thus providing high reliability. Obviously, the higher the scrubbing frequency is, the higher the system reliability is. However, it may take a few hours for a scanning process to check the whole disk. In other words, the scrubbing process may result in a downtime or a lower...
In recent years, the technology of cloud computing has been widely applied in e-business, e-education and etc.. Cloud computing platform is a set of scalable large-scale data server clusters, it provide computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Our research shows that...
This paper proposed a data structure to store irregular warehouse layout diagram. A warehouse unit is defined as four kinds, which are storage point, passage, node and block respectively. The shortest distance and route between two storage points can be calculated by virtue of their adjacent nodes. Based on this, a new genetic algorithm is proposed with an assumption that an order-picking operation...
With the development and integration of the technology in observing Earth from space, lots of information access of three-dimension geographical space and capability of updating has been developed rapidly. The application of Earth science has changed from three-dimension to multi-dimension. Therefore, the processing and storage of multi-dimension spatial data become more and more important. The paper...
In this paper we propose an approximate solution to the inventory stochastic continuous review (Q, r) problem with two storage facilities, an owned warehouse (OW) and a rented warehouse (RW). We show that the reorder point obtained from the (Q, r) model with two warehouses is smaller than the one generated from the unconstrained classical continuous review model and larger than the one derived from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.