期刊文献+
共找到633篇文章
< 1 2 32 >
每页显示 20 50 100
PCT Reforms Its Patent Filing System
1
《中国专利与商标》 2004年第1期39-39,共1页
As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectu... As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa... 展开更多
关键词 PCT Reforms Its Patent filing system WORK THAN
下载PDF
RCache: A Read-Intensive Workload-Aware Page Cache for NVM Filesystem
2
作者 TU Yaofeng ZHU Bohong +2 位作者 YANG Hongzhang HAN Yinjun SHU Jiwu 《ZTE Communications》 2023年第1期89-94,共6页
Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a signi... Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a significant mechanism filling the performance gap between Dynamic Random Access Memory(DRAM)and block devices,is now a liability that heavily hinders the writing performance of NVM filesystems.Therefore state-of-the-art NVM filesystems leverage the direct access(DAX)technology to bypass the page cache entirely.However,the DRAM still provides higher bandwidth than NVM,which prevents skewed read workloads from benefiting from a higher bandwidth of the DRAM and leads to sub-optimal performance for the system.In this paper,we propose RCache,a readintensive workload-aware page cache for NVM filesystems.Different from traditional caching mechanisms where all reads go through DRAM,RCache uses a tiered page cache design,including assigning DRAM and NVM to hot and cold data separately,and reading data from both sides.To avoid copying data to DRAM in a critical path,RCache migrates data from NVM to DRAM in a background thread.Additionally,RCache manages data in DRAM in a lock-free manner for better latency and scalability.Evaluations on Intel Optane Data Center(DC)Persistent Memory Modules show that,compared with NOVA,RCache achieves 3 times higher bandwidth for read-intensive workloads and introduces little performance loss for write operations. 展开更多
关键词 storage system file system persistent memory
下载PDF
Distributed File System Based on a Relational Database
3
作者 Vladyslav Kutsman 《Open Journal of Applied Sciences》 CAS 2023年第5期643-658,共16页
Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today... Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today’s conditions, when an earthquake can destroy the floor of a city in an instant, or when a missile hits an office and all servers turn into scrap metal, the issue of data safety becomes especially important. Also, you can’t put the cost of the software and the convenience of working with files in last place. Especially if an office worker needs to find the necessary information on a client, a financial contract or a company’s financial product in a few seconds. Also, during the operation of computer equipment, failures are possible, and some of them can lead to partial or complete loss of information. In this paper, it is proposed to create another level of abstraction for working with the file system, which will be based on a relational database as a storage of objects and access rights to objects. Also considered are possible protocols for transferring data to other programs that work with files, these can be both small sites and the operating system itself. This article will be especially interesting for financial institutions or companies operating in the banking sector. The purpose of this article is an attempt to introduce another level of abstraction for working with files. A level that is completely abstracted from the storage medium. 展开更多
关键词 File system POSTGRESQL Golang AWS HDD LDAP Active Directory AES Encryption Fintech BANKING
下载PDF
Design and Implementation of Wuzhou Meteorological Statistical Yearbook System Based on Python
4
作者 Hui LIANG Tianwen SONG Yun XIAN 《Meteorological and Environmental Research》 2023年第6期23-28,共6页
Based on Python language, this system implements the Wuzhou Meteorological Statistical Yearbook system, which automatically calculates and generates Excel table. This system can accurately and quickly collect annual m... Based on Python language, this system implements the Wuzhou Meteorological Statistical Yearbook system, which automatically calculates and generates Excel table. This system can accurately and quickly collect annual meteorological data, form meteorological yearbook reports for government departments, and is of great significance for the development of meteorological data business by the Wuzhou Meteorological Bureau. 展开更多
关键词 Python language Y file Yearbook
下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
5
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Enhancing PDF Malware Detection through Logistic Model Trees
6
作者 Muhammad Binsawad 《Computers, Materials & Continua》 SCIE EI 2024年第3期3645-3663,共19页
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a... Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape. 展开更多
关键词 Malware detection PDF files logistic model tree feature selection CYBERSECURITY
下载PDF
Making waste profitable: Efficient recovery of metallic iron from jarosite residues
7
作者 Songshan Zhou Yunhui Han +11 位作者 Rong Huang Yin Huang Qingyuan Dong Haiyin Gang Jinchuan Qin Xi Yu Xiangfei Zeng Wenxing Cao Jiqin Wang Shaoqin Chen Rong Wang Mengjun Chen 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第7期66-76,共11页
To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approac... To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue. 展开更多
关键词 Jarosite residue Electric filed Leaching kinetics
下载PDF
Molecular Dynamics, Physical Properties, Diffusion Coefficients and Activation Energy of the Lithium Oxide (Li-O) and Sodium Oxide (Na-O) Electrolyte (Cathode)
8
作者 Alain Second Dzabana Honguelet Abel Dominique Eboungabeka Timothée Nsongo 《Advances in Materials Physics and Chemistry》 CAS 2024年第9期213-234,共22页
This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied ... This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied a gap-free model using molecular dynamics. Physical quantities such as volume and pressure of the Na-O and Li-O systems exhibit similar behaviors around the thermodynamic ensembles NPT and NVE. However, for the Na2O system, at a minimum temperature value, we observe a range of total energy values;in contrast, for the Li2O system, a minimum energy corresponds to a range of temperatures. Finally, for physicochemical properties, we studied the diffusion coefficient and activation energy of lithium and potassium oxides around their melting temperatures. The order of magnitude of the diffusion coefficients is given by the relation Dli-O >DNa-O for the multiplicity 8*8*8, while for the activation energy, the order is well reversed EaNa-O > EaLi-O. 展开更多
关键词 Molecular Dynamics Diffusion Coefficients Activation Energy Lithium Oxide Sodium Oxide Lennard Jones Potential Data File Atomic and Charge Models CATHODE LAMMPS
下载PDF
更正
9
作者 《汽车电器》 2024年第3期11-11,共1页
尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行... 尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行中的“FlexFile”应改成“FlexRay”。 展开更多
关键词 车载以太网 商用车 仿真测试平台 FLEX 行中 FILE
下载PDF
Improvement Design for Distributed Real-Time Stream Processing Systems 被引量:4
10
作者 Wei Jiang Liu-Gen Xu +1 位作者 Hai-Bo Hu Yue Ma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第1期3-12,共10页
In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of ... In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of horizontal scalability and high throughput, which is manly deployed in many areas in order to address the problem of speed mismatch between message producers and consumers. When using Kafka, we need to quickly receive data sent by producers. In addition, we need to send data to consumers quickly. Therefore, the performance of Kafka is of critical importance to the performance of the whole stream processing system. In this paper, we propose the improved design of real-time stream processing systems, and focus on improving the Kafka's data loading process.We use Kafka cat to transfer data from the source to Kafka topic directly, which can reduce the network transmission. We also utilize the memory file system to accelerate the process of data loading, which can address the bottleneck and performance problems caused by disk I/O. Extensive experiments are conducted to evaluate the performance, which show the superiority of our improved design. 展开更多
关键词 Kafka Kafka CAT memory FILE system MESSAGE QUEUE real-time STREAM processing system
下载PDF
APPLICATION OF MAP AND FILE INFORMATIONVISUALIZATION SYSTEM TO COMPREHENSIVEDIVISION OF NATURAL DISASTERS- Takingthe ChangjiangValleg as an Example 被引量:4
11
作者 HU Bao-qing1,4, JIANG Mei-xin2, JUN Su-lan3, ZENG Qiao-song4 ( 1. Department of Geography, Guangxi Normal College, Narming 530001, P. R. China 2. Department of Resource and Environment Sciences, Jiangxi Normal University, Nanchang 3300 《Chinese Geographical Science》 SCIE CSCD 2001年第4期40-49,共10页
ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build... ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build routes of map and file information visualization system (MFIVS). Taking the Changjiang(Yangtze) Valley as an example, on the basis of revealing up the integrated mechanism on the formations of its natural disasters and its distributing law, thereafter, the paper relies on the MFIVS technique, adopts two top-down and bottom-up approaches to study a comprehensive division of natural disasters. It is relatively objective and precise that the required division results include three natural disaster sections and nine natural disaster sub-sections, which can not only provide a scientific basis for utilizing natural resources and controlling natural disaster and environmental degradation, but also be illuminated to a concise, practical and effective technique on comprehensive division. 展开更多
关键词 KEYWORDS: MAP and FILE information visualization system (MFIVS) natural DISASTER systems damage evaluation comprehensive division the CHANGJIANG VALLEY
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
12
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
FPGA BASED REAL-TIME VIDEO IMAGE ACQUISITION AND STORAGE SYSTEM 被引量:4
13
作者 李娜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第4期404-410,共7页
To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D ... To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D configuration, video image capturing logic control and image storage logic control modules. And IDE in- terface bard disk as storage medium and FAT32 file system as record form are used for real-time image storage. Experimental results show that the system has the advantages of strong real-time capability, high integration, powerful storage, easy expansibility and so on. 展开更多
关键词 video capture FPGA I2C protocol IDE interface FAT32 file format
下载PDF
Building Hot Snapshot Copy Based on Windows File System 被引量:4
14
作者 WANG Lina GUO Chi WANG Dejun ZHU Qin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1503-1506,共4页
This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecb... This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecbnology. HSCF, based on a file system filter driver, protects computer data and ensures their integrity and consistency with following three steps: access to open files, synchronization and copy on-write. Its strategies for improving system performance are analyzed including priority setting, incremental snapshot and load balance. HSCF is a new kind of snapshot technology to solve the data integrity and consistency problem in online backup, which is different from other storage-level snapshot and Open File Solution. 展开更多
关键词 SNAPSHOT backup and recovery windows file system filter driver data integrity and consistency
下载PDF
Reductive denitrification of nitrate by scrap iron filings 被引量:2
15
作者 郝志伟 徐新华 汪大翚 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE EI CAS CSCD 2005年第3期182-186,共5页
Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certai... Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certain by-products, and identify cheaper replacements for expensive conventional PRB materials, especially pure metallic iron. The feasibility of reductive denitrification of nitrate by SIF was studied by batch experiments. Operational parameters such as pH value, SIF dosage and initial concentration of nitrate were investigated. The removal efficiency of nitrate reached 80% under the conditions of pH of 2.5, nitrate initial con- centration of 45 mg/L and SIF dosage of 100 g/L within 4 h. Results indicated that nitrate removal is inversely related to pH. Low pH value condition favors for the nitrate transformation. Different from the results of others who studied nitrate reduction using iron powder, we found that there was a lag time before nitrate reduction occurs, even at low pH. Finally, the possible mechanism of nitrate reduction by Fe0 is discussed. 展开更多
关键词 DENITRIFICATION Scrap iron filings (SIF) Zero-valent iron NITRATE MECHANISM
下载PDF
Comparison of Flow Field Distribution and Characteristic on Different Compact Spinning Systems 被引量:3
16
作者 薛文良 魏孟媛 +2 位作者 汪燕 程隆棣 张瑞寅 《Journal of Donghua University(English Edition)》 EI CAS 2011年第3期326-330,共5页
Numerical simulation models of compact spinning with perforated drum, punched apron and lattice apron were established and computerized with computational fluid dynamics(CFD) software. Characteristics of airflow in co... Numerical simulation models of compact spinning with perforated drum, punched apron and lattice apron were established and computerized with computational fluid dynamics(CFD) software. Characteristics of airflow in condensing zone were achieved. Velocity vectors of the flow on different systems were contrasted and discussed. Then, trajectories of fibers in condensing zone were simulated by a specially designed MATLAB program routine. The result of the simulation clarified the compact mechanism of the compact spinning systems. Also, it applied a guideline for reasonable utilization of the airflow in condensing zone. 展开更多
关键词 perforated drum punched apron lattice apron flow filed simulation analysis
下载PDF
Design and Implementation of File Access and Control System Based on Dynamic Web 被引量:3
17
作者 GAO Fuxiang YAO Lan BAO Shengfei YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1233-1237,共5页
A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is c... A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained. 展开更多
关键词 file access and control ACTIVEX role based access control (RBAC) VERSION
下载PDF
File Wallet:A File Management System Based on IPFS and Hyperledger Fabric 被引量:1
18
作者 Jienan Chen Chuang Zhang +1 位作者 Yu Yan Yuan Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第2期949-966,共18页
Online file management systems enable cooperatively editing and sharing.However,due to the cost of communication and storage infrastructures,traditional online file management services,e.g.,Google Drive and OneDrive,u... Online file management systems enable cooperatively editing and sharing.However,due to the cost of communication and storage infrastructures,traditional online file management services,e.g.,Google Drive and OneDrive,usually provide limited storage space and relatively low download speed for free users.To achieve better performance,ordinary users have to purchase their expensive services.Moreover,these file management systems are based on centralized architecture and bear the privacy leakage risk,because users’personal files are stored and controlled by their servers.To address the above problems,we propose a peer-to-peer(P2P)file management system based on IPFS and Hyperledger Fabric,named as FileWallet,which can serve as a personal wallet for individual users or organizations to store and share their files in a secure manner.In FileWallet,the users form a P2P network and a Fabric network,where P2P network builds the connections and distributed storage network and the Fabric network sustains consistent blockchain ledgers to record file operation related transactions.In our FileWallet,the storage and communication costs are mitigated in the decentralized design,and the file owner can fully control the access permission of the file to preserve the file privacy.The design of the system architecture,main functionalities,and system implementations are presented in this paper.The performance of the system is evaluated through experiments,and the experimental results show its wide applicability and scalability. 展开更多
关键词 Blockchain file sharing IPFS
下载PDF
DESIGN OF A SYSTEM SOFTWARE BASED ON A JAVA SOC PROCESSOR 被引量:1
19
作者 Chen Zhirui Lin Chunyou Tan Hongzhou 《Journal of Electronics(China)》 2010年第6期853-859,共7页
Java technology is spreading rapidly all over the world in recent years. It is a popular application development language for its well-encapsulation, platform-independent and high security. There are great amounts of ... Java technology is spreading rapidly all over the world in recent years. It is a popular application development language for its well-encapsulation, platform-independent and high security. There are great amounts of Java games and other gadgets on mobile platforms, as well as on set-up-box systems. As Java applications become more sophisticated, the Java Virtual Machine (JVM) mid-dle-wares in embedded systems are not satisfying, Java-specific chips extend in the market. All existing Java-based system software or Operating System (OS) are used on JVM, they cannot be used on Java processors. It is important to develop a pure Java system software or OS so that embedded systems using Java processors will have great performance in Java applications. This paper presents a set of system software designed for a Java-specified processor VP6K, which is also a System-on-Chip (SoC). This system software includes real-time multitask dispatching, file management, device management, hardware drivers, and infrastructural Application Programming Interface (APIs). According to ex-perimental results, the system software provides interfaces for Java programs to fully handle CPU resource, so that all applications can be executed properly and efficiently. VP6K embedded platform shows its good performance for Java applications when the system software is implemented. 展开更多
关键词 Java processor Operating system (OS) Task scheduling File management Device management
下载PDF
Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions 被引量:1
20
作者 Emmanuel N. Ekwonwune Bright U. Ezeoha 《International Journal of Communications, Network and System Sciences》 2019年第4期49-58,共10页
The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environmen... The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environment is presented. Thus, inability to upload sizeable files, slow transportation of files, weak security and lack of fault tolerance are the major problems in the existing system. Hence, the utmost need is to build a client-server network that runs on two or more server systems in order to implement scalability, such that when one server is down, the other(s) would still hold up the activities within the network. And to achieve this reliable network environment, LINUX network operating system is recommended among others as a preferred platform for the synchronization of the server systems, such that every user activity like sending of internal memos/mails, publication of academic articles, is replicated;thereby, achieving the proposed result. Hence, Scalable Distributed File Sharing System provides the robustness required to having a reliable intranet. 展开更多
关键词 DISTRIBUTED system Architecture FILES Sharing DISTRIBUTED File system Replication Reliability TRANSPARENCY Data Access Interfaces FAULT Detection FAULT Tolerance Cache Consistency SCALABILITY
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部