期刊文献+
共找到18,997篇文章
< 1 2 250 >
每页显示 20 50 100
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
1
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
NIC X-FILE和DENCO Pre-Shaper镍钛器械对模拟弯曲根管成形的影响 被引量:1
2
作者 申煜荣 乃仁桐 +4 位作者 赵玲 刘飞刚 尹曹洋 顾远平 陈铁一 《中国组织工程研究》 CAS 北大核心 2024年第3期387-391,共5页
背景:根管预备是根管治疗的关键步骤,近年来随着新型镍钛器械的迅速发展,根管成形能力得到了显著提高,然而不同种类的镍钛系统成形能力亦不同,目前国内外关于R相热处理机用镍钛器械NIC X-FILE和DENCO Pre-Shaper对弯曲根管成形能力的影... 背景:根管预备是根管治疗的关键步骤,近年来随着新型镍钛器械的迅速发展,根管成形能力得到了显著提高,然而不同种类的镍钛系统成形能力亦不同,目前国内外关于R相热处理机用镍钛器械NIC X-FILE和DENCO Pre-Shaper对弯曲根管成形能力的影响鲜见报道。目的:比较NIC X-FILE和DENCO Pre-Shaper机用镍钛锉预备树脂模拟弯曲根管的成形效果。方法:选取树脂模拟弯曲根管50个,随机分为2组(n=25),分别使用NIC X-FILE、DENCO Pre-Shaper镍钛根管锉进行根管预备,记录根管预备时间、采集根管预备前后图像。使用图像处理和分析软件测量各观测点的根管内、外侧壁树脂去除量,运用统计学软件,对比研究两种机用镍钛锉的根管预备时间和中心定位能力。结果与结论:①DENCO Pre-Shaper组平均根管预备时间为(1.58±0.02)min,NIC X-FILE组平均根管预备时间为(2.22±0.03)min,两组间比较差异有显著性意义(P<0.05);②DENCO Pre-Shaper组在距离根尖孔4,5,7,8,9,10 mm处的内侧树脂去除量多于NIC X-FILE组(P<0.05),在距离根尖孔3,5,6,7,8 mm处的外侧树脂去除量少于NIC X-FILE组(P<0.05);③在距离根尖孔2,4,5,6,7,8,9 mm处,NIC X-FILE组的中心定位能力优于DENCO Pre-Shaper组(P<0.05),其中在距离根尖孔4 mm处的中心定位能力最佳;④结果表明,DENCO Pre-Shaper根管锉较NIC X-FILE镍钛根管锉具有较高的机械效率,但其中心定位能力不如NIC X-FILE镍钛根管锉。 展开更多
关键词 NIC X-file DENCO Pre-Shaper 根管预备 镍钛器械 根管预备时间 中心定位能力
下载PDF
西巩驿—李店断裂晚第四纪活动特征——及对1352年会宁7级地震发震构造的初步探讨
3
作者 崔浇 王爱国 +2 位作者 张波 陆诗铭 冯紫微 《地震工程学报》 CSCD 北大核心 2023年第3期513-522,共10页
西巩驿—李店断裂为陇中盆地内部发育的一条活动断裂,断裂活动性的认识对评估陇中盆地内部地震危险性,以及深入理解印度板块与欧亚板块碰撞的远程响应具有重要的科学意义。遥感解译和地震地质调查结果表明:(1)西巩驿—李店断裂位于陇中... 西巩驿—李店断裂为陇中盆地内部发育的一条活动断裂,断裂活动性的认识对评估陇中盆地内部地震危险性,以及深入理解印度板块与欧亚板块碰撞的远程响应具有重要的科学意义。遥感解译和地震地质调查结果表明:(1)西巩驿—李店断裂位于陇中盆地中部,断裂长度约120 km、走向NWW、倾向NW、倾角75°~80°。(2)断裂活动的分段特征明显,断裂中部位于加里东期花岗岩隆起区,地表出露不明显,据此将断裂划分为东、西两段。(3)西段新活动现象明显,主要表现为线性陡崖、高约几米的陡坎地形、山梁和冲沟水系的左旋位错等;东段地表构造地貌人为改造严重且黄土区滑坡发育,断层断错晚第四纪的剖面出露较少,晚更新世有活动,性质为逆冲兼左旋,浅地表局部表现为视正断。(4)结合14C测年结果分析,初步认为西段存在全新世活动,且活动性质为逆冲兼左旋走滑,全新世以来的垂直滑动速率为0.342 mm/a±,晚更新世晚期以来的左旋滑动速率最大为1.60~1.67 mm/a。(5)西段在晚更新世晚期以来至少发生过两次地震事件,一次发生在(11 808~11 401) a B.P.之前;一次事件发生在(6 291~6 120) a B.P.至(5 309~5 050) a B.P.之间。(6)结合前人研究资料分析认为,西巩驿—李店断裂西段可能为1352年会宁7级地震的发震断裂,为本区NEE向构造应力作用下NWW向断裂左旋逆冲作用发震。 展开更多
关键词 西巩驿—李店断裂 陇中盆地 1352年会宁7级地震 发震构造 晚第四纪
下载PDF
FARMER:A novel approach to file access correlation mining and evaluation reference model
4
作者 夏鹏 冯丹 王芳 《Journal of Shanghai University(English Edition)》 CAS 2011年第6期574-588,共15页
File semantic has proven effective in optimizing large scale distributed file system.As a consequence of the elaborate and rich I/O interfaces between upper layer applications and file systems,file system can provide ... File semantic has proven effective in optimizing large scale distributed file system.As a consequence of the elaborate and rich I/O interfaces between upper layer applications and file systems,file system can provide useful and insightful information about semantic.Hence,file semantic mining has become an increasingly important practice in both engineering and research community.Unfortunately,it is a challenge to exploit file semantic knowledge because a variety of factors coulda ffect this information exploration process.Even worse,the challenges are exacerbated due to the intricate interdependency between these factors,and make it difficult to fully exploit the potentially important correlation among various semantic knowledges.This article proposes a file access correlation miming and evaluation reference(FARMER) model,where file is treated as a multivariate vector space,and each item within the vector corresponds a separate factor of the given file.The selection of factor depends on the application,examples of factors are file path,creator and executing program.If one particular factor occurs in both files,its value is non-zero.It is clear that the extent of inter-file relationships can be measured based on the likeness of their factor values in the semantic vectors.Benefit from this model,FARMER represents files as structured vectors of identifiers,and basic vector operations can be leveraged to quantify file correlation between two file vectors.FARMER model leverages linear regression model to estimate the strength of the relationship between file correlation and a set of influencing factors so that the "bad knowledge" can be filtered out.To demonstrate the ability of new FARMER model,FARMER is incorporated into a real large-scale object-based storage system as a case study to dynamically infer file correlations.In addition FARMER-enabled optimize service for metadata prefetching algorithm and object data layout algorithm is implemented.Experimental results show that is FARMER-enabled prefetching algorithm is shown to reduce the metadata operations latency by approximately 30%-40% when compared to a state-of-the-art metadata prefetching algorithm and a commonly used replacement policy. 展开更多
关键词 storage management file correlation file system management mining method and algorithms
下载PDF
NRT FILES镍钛根管锉预备对弯曲根管应力分布的仿真分析 被引量:1
5
作者 蒋谊芳 蔡绮敏 +3 位作者 初政一 秦敏 申煜荣 顾远平 《中国组织工程研究》 CAS 北大核心 2023年第7期1038-1042,共5页
背景:在根管治疗中,镍钛合金器械常因应力超过金属塑性变形的弹性极限或在根管弯曲处重复弯曲导致镍钛合金疲劳断裂。目的:探索新型镍钛锉NRT FILES在作为根管预备材料时对根管内壁存在的应力分布,明确应力集中区域。方法:利用Solidwork... 背景:在根管治疗中,镍钛合金器械常因应力超过金属塑性变形的弹性极限或在根管弯曲处重复弯曲导致镍钛合金疲劳断裂。目的:探索新型镍钛锉NRT FILES在作为根管预备材料时对根管内壁存在的应力分布,明确应力集中区域。方法:利用Solidworks软件对NRT FILES进行三维建模,模拟还原器械在真实口腔环境中存在的状态。建立6组根管简化模型:①弯曲角度30°、弯曲半径5 mm、根尖弯曲;②弯曲角度30°、弯曲半径5 mm、根中弯曲;③弯曲角度30°、弯曲半径2 mm、根尖弯曲;④弯曲角度30°、弯曲半径2 mm、根中弯曲;⑤弯曲角度45°、弯曲半径5 mm、根尖弯曲;⑥弯曲角度45°、弯曲半径2 mm、根尖弯曲。将根管简化模型与根管锉模型进行组配,对根管内壁受力点及应力分布情况进行分析。结果与结论:①-⑥组根管锉最大应力分别为1 185,1 354,1 371,1 678,1 335,2 557 MPa,最大应变分别为0.010 36,0.013 54,0.013 79,0.016 48,0.013 45,0.022 03;根管弯曲部位的不同会影响根管锉所承受的应力大小,因此在根管治疗中,根管锉沿着根管越往下,根管锉与根管接触的半径越大、刚性越差,根管锉所承受的应力越大越容易发生断裂;根管弯曲半径越小,根管锉承受的应力越大;根管弯曲角度越小,根管锉所承受的应力越大。在根尖弯曲部位,根管锉在根管弯曲半径小的弯曲根管需要承受更大的应力,根管锉更容易发生断裂;同理,在根中弯曲部位,根管锉在根管弯曲半径小的弯曲根管亦承受更大的应力,因此要格外注意根管的弯曲程度,以此来选择合适的根管锉进行根管治疗。 展开更多
关键词 弯曲根管 NRT fileS镍钛锉 根管预备 应力分布 有限元分析
下载PDF
A novel clustering and supervising users' profiles method
6
作者 ZhuMingfu ZhangHongbin SongFangyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期456-459,共4页
To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution... To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance. 展开更多
关键词 cluster tree group/CT tree SESSION log data files
下载PDF
A Preliminary Study on the Management Strategy of University Personnel Files based on Artificial Intelligence Technology 被引量:2
7
作者 Litao Cui 《Journal of Electronic Research and Application》 2021年第2期1-4,共4页
In order to improve the management strategy for personnel files in colleges and universities,simplify the complex process of file management,and improve file management security and content preservation of the files.T... In order to improve the management strategy for personnel files in colleges and universities,simplify the complex process of file management,and improve file management security and content preservation of the files.This paper elaborates on the application of Artificial Intelligence(AI)technology in university personnel file management through theoretical analysis based on the understanding of Al technology. 展开更多
关键词 AI technology Personnel files Management strategy
下载PDF
File Transfer Algorithm for Autonomous Decentralized System
8
作者 桂勋 谭永东 钱清泉 《Journal of Southwest Jiaotong University(English Edition)》 2008年第3期214-221,共8页
A file transfer algorithm based on ADP (autonomous decentrafized protocol) was proposed to solve the problem that the ADS (autonomous decentralized system) middleware (NeXUS/Drink) lacks of file transfer functio... A file transfer algorithm based on ADP (autonomous decentrafized protocol) was proposed to solve the problem that the ADS (autonomous decentralized system) middleware (NeXUS/Drink) lacks of file transfer functions for Windows. The algorithm realizes the peer-to-peer file transfer, one-to-N inquiry/multi-response file transfer and one-to-N file distribution in the same data field based on communication patterns provided by the ADP. The peer-to-peer file transfer is implemented through a peer-to-peer communication path, one-to-N inquiry/multi-response file transfer and one-to-N file distribution are implemented through multicast communication. In this algorithm, a file to be transferred is named with a GUID (global unique identification), every data packet is marked with a sequence number, and file-receiving in parallel is implemented by caching DPOs(data processing objects) and multi-thread technologies. The algorithm is applied in a simulation system of the decentralized control platform, and the test results and long time stable tanning prove the feasibility of the algorithm. 展开更多
关键词 ADS ADP file transfer algorithm NeXUS/Dlink
下载PDF
Instructions for the EndNote Reference Style File of Zoological Research
9
《Zoological Research》 CAS CSCD 北大核心 2014年第1期78-79,共2页
EndNote is a reference management software package produced by Thomson Reuters used to manage bibliographies and references in research essays and articles. EndNote works by grouping citations into "libraries" with ... EndNote is a reference management software package produced by Thomson Reuters used to manage bibliographies and references in research essays and articles. EndNote works by grouping citations into "libraries" with the file extension *.enl and a corresponding *.data folder. Aside from the library function, 展开更多
关键词 ENDnoTE file
下载PDF
Research on Real-Time High Reliable Network File Distribution Technology
10
作者 Chenglong Li Peipeng Liu +5 位作者 Hewei Yu Mengmeng Ge Xiangzhan Yu Yi Xin Yuhang Wang Dongyu Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1739-1752,共14页
The rapid development of Internet of Things(IoT)technology has made previously unavailable data available,and applications can take advantage of device data for people to visualize,explore,and build complex analyses.A... The rapid development of Internet of Things(IoT)technology has made previously unavailable data available,and applications can take advantage of device data for people to visualize,explore,and build complex analyses.As the size of the network and the number of network users continue to increase,network requests tend to aggregate on a small number of network resources,which results in uneven load on network requests.Real-time,highly reliable network file distribution technology is of great importance in the Internet of Things.This paper studies real-time and highly reliable file distribution technology for large-scale networks.In response to this topic,this paper studies the current file distribution technology,proposes a file distribution model,and proposes a corresponding load balancing method based on the file distribution model.Experiments show that the system has achieved real-time and high reliability of network transmission. 展开更多
关键词 High reliable network file distribution load balancing
下载PDF
ERROR COUNTER-BASED NEGATIVE ACKNOWLEDGEMENT MODE IN CCSDS FILE DELIVERY PROTOCOL
11
作者 Xiao Shiiie Yang Mingchuan Guo Qing 《Journal of Electronics(China)》 2011年第2期222-227,共6页
Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in ter... Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems(CCSDS) developed CCSDS File Delivery Protocol(CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement(NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a ter-restrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay. 展开更多
关键词 Deep space communication Consultative Committee for Space Data Systems(CCSDS) file Delivery Protocol(CFDP) Negative AcKnowledgement(NAK) mode
下载PDF
Characteristics of the ore-forming fluid in the Huayuan Pb-Zn ore filed, Northwest of Hunan Province, China
12
作者 WEI Hantao SHAO Yongjun +2 位作者 ZHOU Haodi WANG Cheng XIONG Yiqu 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第S1期239-240,共2页
1 Geological Setting The Huayuan Pb-Zn ore field in Xiangxi is located in the southeastern margin of the Yangtze block and the mid-segment of the West Hunan-West Hubei metallogenic belt.The exposed stratum are the lower
关键词 Characteristics of the ore-forming fluid in the Huayuan Pb-Zn ore filed China northwest of Hunan Province REE Pb Cl Zn
下载PDF
ZTE Leading in LTE Innovation;1700 Patents for LTE/SAE Filed
13
作者 ZTE Corperation 《ZTE Communications》 2010年第1期7-7,共1页
ZTE Corporation announced on February 12, 2010 that by late 2009 it had applied for more than 1,700 LTE/SAE patents. ZTE is focused on advancing the LTE market with strong innovation that will benefit both consumers a... ZTE Corporation announced on February 12, 2010 that by late 2009 it had applied for more than 1,700 LTE/SAE patents. ZTE is focused on advancing the LTE market with strong innovation that will benefit both consumers and operators with 4G experience and functionality. 展开更多
关键词 ZTE Leading in LTE Innovation 1700 Patents for LTE/SAE filed LTE INnoVATION SAE
下载PDF
Design and Implementation of File Upload based on AJAX Technology
14
作者 Qin Ma 《International Journal of Technology Management》 2013年第3期50-52,共3页
This article firstly described the related definition and technology of Ajax. Combined with Freemarker template engine with Spring and Hibernate framework technology to generate a page view, put forward the FSH the fr... This article firstly described the related definition and technology of Ajax. Combined with Freemarker template engine with Spring and Hibernate framework technology to generate a page view, put forward the FSH the framework of a complete program, and realize upload with progress bar display. 展开更多
关键词 AJAX Upload file Web 2.0
下载PDF
Design and Implement an Novel File Access Prediction Model in Linux
15
作者 刘谐 刘心松 +1 位作者 杨峰 白英杰 《Journal of Electronic Science and Technology of China》 2004年第2期36-41,共6页
So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-... So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-based successor (FRS) is presented which combines the advantages of the file frequency with the historical record. FRS model has the capability of rapid response to workload changes and can predict future events with greater accuracy than most of other prediction models. To evaluate the performance of FRS mode, the Linux kernel is modified to predict and prefetch upcoming accesses. The experiment shows that FRS can accurately predict approximately 80% of all file access events, while maintaining an immediate successor queue (ISQ) per-file which only requires regular dynamic updates. 展开更多
关键词 file access prediction model PREDICTIVE prefetch FRS
下载PDF
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
16
作者 Sagheer Abbas Syed Ali Raza +4 位作者 MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3263-3278,共16页
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ... File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems. 展开更多
关键词 Automated file labeling file organization machine learning topic modeling
下载PDF
基于序列挖掘的Dockerfile规则自动提取工具
17
作者 詹威霖 周宇 《计算机系统应用》 2023年第7期293-298,共6页
Dockerfile定义了一组构建容器镜像的指令,这些指令指示了容器化的应用程序该如何构建.最近的研究表明Dockerfile存在相当多的质量问题.在本文中,我们提出了一种新的工具DMiner(Dockerfile Miner)来提取高质量Dockerfile中的隐含规则,... Dockerfile定义了一组构建容器镜像的指令,这些指令指示了容器化的应用程序该如何构建.最近的研究表明Dockerfile存在相当多的质量问题.在本文中,我们提出了一种新的工具DMiner(Dockerfile Miner)来提取高质量Dockerfile中的隐含规则,这些规则将有助于提升Dockerfile的质量.DMiner主要分为3个模块,分别负责Dockerfile的采集、过滤,Dockerfile的解析处理以及Dockerfile规则的挖掘提取,DMiner将Dockerfile解析成统一的序列表示并使用序列模式挖掘算法来提取规则.本工具对现有的Dockerfile数据集进行了扩充,同时新提取出了9条在其他工作未曾出现的规则,在真实数据集上的大量实验证明了该工具的有效性和高效性. 展开更多
关键词 Dockerfile 规则挖掘 DOCKER 配置文件
下载PDF
Enhanced Best Fit Algorithm for Merging Small Files
18
作者 Adnan Ali Nada Masood Mirza Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期913-928,共16页
In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and ... In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc. 展开更多
关键词 Big data Hadoop MapReduce small file HDFS
下载PDF
Distributed File System Based on a Relational Database
19
作者 Vladyslav Kutsman 《Open Journal of Applied Sciences》 CAS 2023年第5期643-658,共16页
Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today... Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today’s conditions, when an earthquake can destroy the floor of a city in an instant, or when a missile hits an office and all servers turn into scrap metal, the issue of data safety becomes especially important. Also, you can’t put the cost of the software and the convenience of working with files in last place. Especially if an office worker needs to find the necessary information on a client, a financial contract or a company’s financial product in a few seconds. Also, during the operation of computer equipment, failures are possible, and some of them can lead to partial or complete loss of information. In this paper, it is proposed to create another level of abstraction for working with the file system, which will be based on a relational database as a storage of objects and access rights to objects. Also considered are possible protocols for transferring data to other programs that work with files, these can be both small sites and the operating system itself. This article will be especially interesting for financial institutions or companies operating in the banking sector. The purpose of this article is an attempt to introduce another level of abstraction for working with files. A level that is completely abstracted from the storage medium. 展开更多
关键词 file System POSTGRESQL Golang AWS HDD LDAP Active Directory AES Encryption Fintech BANKING
下载PDF
RCache: A Read-Intensive Workload-Aware Page Cache for NVM Filesystem
20
作者 TU Yaofeng ZHU Bohong +2 位作者 YANG Hongzhang HAN Yinjun SHU Jiwu 《ZTE Communications》 2023年第1期89-94,共6页
Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a signi... Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a significant mechanism filling the performance gap between Dynamic Random Access Memory(DRAM)and block devices,is now a liability that heavily hinders the writing performance of NVM filesystems.Therefore state-of-the-art NVM filesystems leverage the direct access(DAX)technology to bypass the page cache entirely.However,the DRAM still provides higher bandwidth than NVM,which prevents skewed read workloads from benefiting from a higher bandwidth of the DRAM and leads to sub-optimal performance for the system.In this paper,we propose RCache,a readintensive workload-aware page cache for NVM filesystems.Different from traditional caching mechanisms where all reads go through DRAM,RCache uses a tiered page cache design,including assigning DRAM and NVM to hot and cold data separately,and reading data from both sides.To avoid copying data to DRAM in a critical path,RCache migrates data from NVM to DRAM in a background thread.Additionally,RCache manages data in DRAM in a lock-free manner for better latency and scalability.Evaluations on Intel Optane Data Center(DC)Persistent Memory Modules show that,compared with NOVA,RCache achieves 3 times higher bandwidth for read-intensive workloads and introduces little performance loss for write operations. 展开更多
关键词 storage system file system persistent memory
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部