期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
The Method of Data Access for Nuclear Instrument Based on Linked List
1
作者 Zhi Liu Rui Li +2 位作者 Hong Huang Yi Cheng Xiaoping Yu 《Journal of Computer and Communications》 2016年第7期1-6,共6页
A new method of data access which can effectively resolve the problem of high speed and real time reading data of nuclear instrument in small storage space is introduced. This method applies the data storage mode of ... A new method of data access which can effectively resolve the problem of high speed and real time reading data of nuclear instrument in small storage space is introduced. This method applies the data storage mode of “linked list” to the system of Micro Control Unit (MCU), and realizes the pointer access of nuclear data on the small storage space of MCU. Experimental results show that this method can solve some problems of traditional data storage method, which has the advantages of simple program design, stable performance, accurate data, strong repeatability, saving storage space and so on. 展开更多
关键词 linked list Data Storage Method Nuclear Instrument
下载PDF
NONH:A New Cache-Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation
2
作者 房至一 鞠九滨 《Journal of Computer Science & Technology》 SCIE EI CSCD 1996年第4期405-415,共11页
The management of memory coherence is an important problem in distributed shared memory (DSM) system. In a cache-based coherence DSM system using linked list structure, the key to maintaining the coherence and improvi... The management of memory coherence is an important problem in distributed shared memory (DSM) system. In a cache-based coherence DSM system using linked list structure, the key to maintaining the coherence and improving system performance is how to manage the owner in the linked list. This paper presents the design of a new management protocol-NONH (New-OwnerNew-Head) and its performance evaluation. The analysis results show that thisprotocol can improve the scalability and performence of a coherent DSM system using linked list. It is also suitable for managing the cache coherency in tree-like hierarchical architecture. 展开更多
关键词 linked list cache coherence distributed shared memory
原文传递
Optimizing Storage for Energy Conservation in Tracking Wireless Sensor Network Objects
3
作者 Vineet Sharma Mohammad Zubair Khan +2 位作者 Shivani Batra Abdullah Alsaeedi Prakash Srivastava 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1211-1231,共21页
The amount of needed control messages in wireless sensor networks(WSN)is affected by the storage strategy of detected events.Because broadcasting superfluous control messages consumes excess energy,the network lifespa... The amount of needed control messages in wireless sensor networks(WSN)is affected by the storage strategy of detected events.Because broadcasting superfluous control messages consumes excess energy,the network lifespan can be extended if the quantity of control messages is decreased.In this study,an optimized storage technique having low control overhead for tracking the objects in WSN is introduced.The basic concept is to retain observed events in internal memory and preserve the relationship between sensed information and sensor nodes using a novel inexpensive data structure entitled Ordered Binary Linked List(OBLL).Whenever an object passes over the sensor area,the recognizing sensor can immediately produce an OBLL along the object’s route.To retrieve the entire information,the OBLL can be traversed with logarithmic complexity which is much less than the traversing complexity of existing linked list structures.Performance evaluation and simulations were carried out to ensure that the suggested technique minimizes the number of messages and thus saving energy and extending the network life. 展开更多
关键词 Energy conservation linked list object tracking wireless sensor networks
下载PDF
Hash Table Assisted Efficient File Level De-Duplication Scheme in SD-IoV Assisted Sensing Devices
4
作者 Ghawar Said Ata Ullah +4 位作者 Anwar Ghani Muhammad Azeem Khalid Yahya Muhammad Bilal Sayed Chhattan Shah 《Intelligent Automation & Soft Computing》 2023年第10期83-99,共17页
The Internet of Things(IoT)and cloud technologies have encouraged massive data storage at central repositories.Software-defined networks(SDN)support the processing of data and restrict the transmission of duplicate va... The Internet of Things(IoT)and cloud technologies have encouraged massive data storage at central repositories.Software-defined networks(SDN)support the processing of data and restrict the transmission of duplicate values.It is necessary to use a data de-duplication mechanism to reduce communication costs and storage overhead.Existing State of the art schemes suffer from computational overhead due to deterministic or random tree-based tags generation which further increases as the file size grows.This paper presents an efficient file-level de-duplication scheme(EFDS)where the cost of creating tags is reduced by employing a hash table with key-value pair for each block of the file.Further,an algorithm for hash table-based duplicate block identification and storage(HDBIS)is presented based on fingerprints that maintain a linked list of similar duplicate blocks on the same index.Hash tables normally have a consistent time complexity for lookup,generating,and deleting stored data regardless of the input size.The experiential results show that the proposed EFDS scheme performs better compared to its counterparts. 展开更多
关键词 Hash table de-duplication linked list IoT sensing devices
下载PDF
Research on the Optimization and Simulation of the Shortest Path Based on Algorithm of Dijkstra 被引量:6
5
作者 Chuan-xiang REN,Xin-gang HAO,Ying-rui WANG, Guang-hui PAN (College of Information and Electrical Engineering,Shandong University of Science and Technology,Qingdao 266510,China) 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期199-201,37,共4页
Dijkstra algorithm is a theoretical basis to solve transportation network problems of the shortest path, which has a wide range of application in path optimization. Through analyzing traditional Dijkstra algorithm,on ... Dijkstra algorithm is a theoretical basis to solve transportation network problems of the shortest path, which has a wide range of application in path optimization. Through analyzing traditional Dijkstra algorithm,on account of the insufficiency of this algorithm in path optimization,this paper uses adjacency list and circular linked list with combination to store date,and through the improved quick sorting algorithm for weight sorting, accomplish a quick search to the adjacent node,and so an improved Dijkstra algorithm is got.Then apply it to the optimal path search,and make simulation analysis for this algorithm through the example,also verify the effectiveness of the proposed algorithm. 展开更多
关键词 route optimization Dijkstra algorithm fast sorting algorithm adjacency list and circular linked list
下载PDF
Research on Higher Education Collaborative Management Platform Based on Relationship Graph
6
作者 Aiyan Wu 《Journal on Artificial Intelligence》 2022年第2期77-84,共8页
According to the current problems of higher education management informatization,this paper puts forward a development scheme of collaborative platform on education management.The main technology includes three parts... According to the current problems of higher education management informatization,this paper puts forward a development scheme of collaborative platform on education management.The main technology includes three parts.First,integrate the distributed database and use two-tier linked list to realize dynamic data access.Second,the relation graph is used to display the data of each student,so as to realize the visual sharing of data.Third,realize the collaborative information security mechanism from three aspects to ensure the legal sharing of data.Finally,the platform development is completed with Java.It can help to improve the effectiveness of educating students. 展开更多
关键词 Collaborative management relationship graph linked list
下载PDF
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
7
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部