Academic literature on the topic 'Computer storage devices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer storage devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer storage devices"

1

Rarath, Darshana, Mayank Sharma, Akshay Mane, Pooja Dabral, and Roshani Raut. "Computer Independent Data Transfer Device." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 2 (July 6, 2017): 72. http://dx.doi.org/10.3991/ijes.v5i2.7038.

Full text
Abstract:
<p class="IEEEAbtract"><span lang="EN-GB">In today’s era, </span><span lang="EN-GB">transferring data among distinct storage devices has become one of the tasks which are done most frequently. In order to make data and information omnipresent, it needs to be shared anywhere and anytime. However the reliance of user on a PC or laptop for the same is not efficient. This paper is about the innovative way to overcome this restriction. This paper discusses the development of a portable device with the use of wired and wireless communication applications to share data and information among distinct storage devices without relying on a PC or a laptop. The proposed device is compact, comprises of a touch screen, power source and is capable of transferring all types of files. Hence, it eliminates the dependence on a PC or a laptop for transferring data.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
2

POTTER, SHAYA, OREN LAADAN, RICARDO BARATTO, LEONARD KIM, and JASON NIEH. "MEDIAPOD: A POCKET-SIZED AND PERSONALIZED MULTIMEDIA DESKTOP." International Journal of Semantic Computing 04, no. 02 (June 2010): 181–202. http://dx.doi.org/10.1142/s1793351x10001000.

Full text
Abstract:
We present MediaPod, a portable system that allows mobile users to maintain the same persistent, personalized multimedia desktop environment on any available computer. Regardless of which computer is being used, MediaPod provides a consistent multimedia desktop session, maintaining all of a user's applications, documents and configuration settings. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. MediaPod provides a virtualization and checkpoint-restart mechanism that decouples a desktop environment and its applications from the host, enabling multimedia desktop sessions to be suspended to portable storage, carried around, and resumed from the storage device on another computer. MediaPod virtualization also isolates desktop sessions from the host, protecting the privacy of the user and preventing malicious applications from damaging the host. We have implemented a Linux MediaPod prototype and demonstrate its ability to quickly suspend and resume multimedia desktop sessions, enabling a seamless computing experience for mobile users as they move among computers.
APA, Harvard, Vancouver, ISO, and other styles
3

Sassani (Sarrafpour), Bahman A., Mohammed Alkorbi, Noreen Jamil, M. Asif Naeem, and Farhaan Mirza. "Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices." Scientific Programming 2020 (May 31, 2020): 1–9. http://dx.doi.org/10.1155/2020/6132312.

Full text
Abstract:
Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
4

Oriz-Lombardia, Mifuel, and Chandra S. Verma. "Proteins as data storage devices: insights from computer models." Journal of Physics: Conference Series 34 (April 1, 2006): 7–14. http://dx.doi.org/10.1088/1742-6596/34/1/002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salamat, Sahand, Hui Zhang, Yang Seok Ki, and Tajana Rosing. "NASCENT2: Generic Near-Storage Sort Accelerator for Data Analytics on SmartSSD." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–29. http://dx.doi.org/10.1145/3472769.

Full text
Abstract:
As the size of data generated every day grows dramatically, the computational bottleneck of computer systems has shifted toward storage devices. The interface between the storage and the computational platforms has become the main limitation due to its limited bandwidth, which does not scale when the number of storage devices increases. Interconnect networks do not provide simultaneous access to all storage devices and thus limit the performance of the system when executing independent operations on different storage devices. Offloading the computations to the storage devices eliminates the burden of data transfer from the interconnects. Near-storage computing offloads a portion of computations to the storage devices to accelerate big data applications. In this article, we propose a generic near-storage sort accelerator for data analytics, NASCENT2, which utilizes Samsung SmartSSD, an NVMe flash drive with an on-board FPGA chip that processes data in situ. NASCENT2 consists of dictionary decoder, sort, and shuffle FPGA-based accelerators to support sorting database tables based on a key column with any arbitrary data type. It exploits data partitioning applied by data processing management systems, such as SparkSQL, to breakdown the sort operations on colossal tables to multiple sort operations on smaller tables. NASCENT2 generic sort provides 2 × speedup and 15.2 × energy efficiency improvement as compared to the CPU baseline. It moreover considers the specifications of the SmartSSD (e.g., the FPGA resources, interconnect network, and solid-state drive bandwidth) to increase the scalability of computer systems as the number of storage devices increases. With 12 SmartSSDs, NASCENT2 is 9.9× (137.2 ×) faster and 7.3 × (119.2 ×) more energy efficient in sorting the largest tables of TPCC and TPCH benchmarks than the FPGA (CPU) baseline.
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, encompass a variety of entities ranging from personal computers and phones to servers and networking hardware. Computer networks enable various applications to access resources such as the World Wide Web, shared application and storage servers, printers, fax machines, as well as email and instant messaging applications. They play a pivotal role in facilitating information sharing across diverse tasks.Computer networks can be classified into two types: open systems and closed systems. Open systems are easily connected to networks and are primed for communication. Conversely, closed systems require proper authentication and are not as readily connected to other networks..
APA, Harvard, Vancouver, ISO, and other styles
7

Watson, Ian. "Securing portable storage devices." Network Security 2006, no. 7 (July 2006): 8–11. http://dx.doi.org/10.1016/s1353-4858(06)70410-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thangavel, Vijayakumar. "Survey on Computer Forensics and its most using Technique Steganography." December 2023 2, no. 2 (December 2023): 425–34. http://dx.doi.org/10.36548/rrrj.2023.2.013.

Full text
Abstract:
A subfield of digital forensic science called computer forensics deals with evidence discovered on computers and digital storage devices. Computer forensics aims to detect, preserve, retrieve, analyse and communicate facts and views regarding the digital information by performing a forensically sound examination of digital media. The purpose of this study is to provide a brief discussion of computer forensics and related methods. Steganography is one of the most widely utilised of these approaches, and it will also be briefly discussed below.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Bixin, Shiyang Zhang, Lan Xu, Qiong Su, and Bin Du. "Emerging Robust Polymer Materials for High-Performance Two-Terminal Resistive Switching Memory." Polymers 15, no. 22 (November 10, 2023): 4374. http://dx.doi.org/10.3390/polym15224374.

Full text
Abstract:
Facing the era of information explosion and the advent of artificial intelligence, there is a growing demand for information technologies with huge storage capacity and efficient computer processing. However, traditional silicon-based storage and computing technology will reach their limits and cannot meet the post-Moore information storage requirements of ultrasmall size, ultrahigh density, flexibility, biocompatibility, and recyclability. As a response to these concerns, polymer-based resistive memory materials have emerged as promising candidates for next-generation information storage and neuromorphic computing applications, with the advantages of easy molecular design, volatile and non-volatile storage, flexibility, and facile fabrication. Herein, we first summarize the memory device structures, memory effects, and memory mechanisms of polymers. Then, the recent advances in polymer resistive switching materials, including single-component polymers, polymer mixtures, 2D covalent polymers, and biomacromolecules for resistive memory devices, are highlighted. Finally, the challenges and future prospects of polymer memory materials and devices are discussed. Advances in polymer-based memristors will open new avenues in the design and integration of high-performance switching devices and facilitate their application in future information technology.
APA, Harvard, Vancouver, ISO, and other styles
10

Mladenov, G., V. Spivak, E. Koleva, A. Bogdan, and S. Zelensky. "Micro-and nanostructures in modern memory devices." Electronics and Communications 16, no. 2 (March 28, 2011): 5–8. http://dx.doi.org/10.20535/2312-1807.2011.16.2.267720.

Full text
Abstract:
Electronic storage devices are an important part of modern information and communication systems, defining the parameters and possibilities of the whole system. In this paper it is shown the operating principle and parameters of dynamic random-access storage media, working as operative memory in computer systems as well as the flash-memories, wide and successive used as input and output of data and to keep it out of information systems.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer storage devices"

1

Marmol, Leonardo. "Customized Interfaces for Modern Storage Devices." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3165.

Full text
Abstract:
In the past decade, we have seen two major evolutions on storage technologies: flash storage and non-volatile memory. These storage technologies are both vastly different in their properties and implementations than the disk-based storage devices that current soft- ware stacks and applications have been built for and optimized over several decades. The second major trend that the industry has been witnessing is new classes of applications that are moving away from the conventional ACID (SQL) database access to storage. The resulting new class of NoSQL and in-memory storage applications consume storage using entirely new application programmer interfaces than their predecessors. The most significant outcome given these trends is that there is a great mismatch in terms of both application access interfaces and implementations of storage stacks when consuming these new technologies. In this work, we study the unique, intrinsic properties of current and next-generation storage technologies and propose new interfaces that allow application developers to get the most out of these storage technologies without having to become storage experts them- selves. We first build a new type of NoSQL key-value (KV) store that is FTL-aware rather than flash optimized. Our novel FTL cooperative design for KV store proofed to simplify development and outperformed state of the art KV stores, while reducing write amplification. Next, to address the growing relevance of byte-addressable persistent memory, we build a new type of KV store that is customized and optimized for persistent memory. The resulting KV store illustrates how to program persistent effectively while exposing a simpler interface and performing better than more general solutions. As the final component of the thesis, we build a generic, native storage solution for byte-addressable persistent memory. This new solution provides the most generic interface to applications, allow- ing applications to store and manipulate arbitrarily structured data with strong durability and consistency properties. With this new solution, existing applications as well as new “green field” applications will get to experience native performance and interfaces that are customized for the next storage technology evolution.
APA, Harvard, Vancouver, ISO, and other styles
2

Florence, Trevor Bradshaw. "KiwiVault: Encryption Software for Portable Storage Devices." BYU ScholarsArchive, 2009. https://scholarsarchive.byu.edu/etd/2156.

Full text
Abstract:
While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found in unprotected drives such as portability, usability, and the ability to share documents between multiple people. In addition, other drawbacks are introduced such as the possibility of losing access to protected documents if a password is lost. Assuming protecting portable documents is important, in order for people to be willing to protect their documents they should be required to make as few sacrifices in functionality as possible. We introduce KiwiVault, a USB flash drive encryption solution that retains more of the functionality found in unprotected storage devices than preceding solutions. In addition, this thesis reviews encryption solutions appropriate for portable data storage, reviews security components used by KiwiVault, discusses the design and implementation of KiwiVault, discusses a user study and threat analysis conducted to validate KiwiVault as a solution, and proposes future work.
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, Chun Keung. "A study on non-volatile memory scaling in the sub-100nm regime /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20CHAN.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ketrick, Robert Paul. "Design, fabrication and implementation of a hash table processor /." Online version of thesis, 1987. http://hdl.handle.net/1850/10497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sudirgo, Stephen. "Quantum and spin-based tunneling devices for memory systems /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/2066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ankireddipally, L. R. "Formalization of storage considerations in software design." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=548.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 1999.
Title from document title page. Document formatted into pages; contains vii, 110 p. : ill. Includes abstract. Includes bibliographical references (p. 95-97).
APA, Harvard, Vancouver, ISO, and other styles
7

Langston, Jeremy W. "Availability and performance analysis of data hot-spots in distributed storage systems a thesis presented to the faculty of the Graduate School, Tennessee Technological University /." Click to access online, 2009. http://proquest.umi.com/pqdweb?index=0&did=1797609571&SrchMode=1&sid=2&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1268408220&clientId=28564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Day, Daniel John, and DDay@groupwise swin edu au. "Three-dimensional bit optical data storage in a photorefractive polymer." Swinburne University of Technology. Centre for Micro-Photonics, 2001. http://adt.lib.swin.edu.au./public/adt-VSWT20050307.112258.

Full text
Abstract:
As the computer industry grows, so will the requirements for data storage. Magnetic memory has been the most stable method in terms of capacity and recording/reading speed. However, we have reached the point where a substantial increase in the capacity cannot be produced without increasing the size of the system. When compact discs (CDs) were introduced in the 1980�s they revolutionized the concept of data storage. While the initial force behind compact discs could easily be said to be the music industry, once recordable and rewritable discs became available they quickly found more use in the computer industry as backup devices. Since their inception, the capacity requirements have far exceeded what is available on a compact disc, and they are now following the same path as magnetic memories. Following this trend, it could be assumed that digital versatile discs or digital video discs (DVDs) have a limited lifetime as a storage medium. In fact it has been noted (Higuchi et al., 1999) that the maximum capacity of digital video discs will be reached in 3 � 5 years. The question then is, what comes next? The efficiency of conventional optical data storage is extremely poor. For an optically thick recording medium, both CDs and DVDs use less than 0.01% of the total volume to store the information. Three-dimensional bit optical data storage endeavors to increase the efficiency by recording information in a volume that is greater than 90% of the total volume. The concept of three-dimensional bit optical data storage was first proposed by Parthenopoulos and Rentzepis in 1989, where they demonstrated that capacities far exceeding that of compact discs could be achieved. Three-dimensional bit optical data storage relies on creating a highly localised chemical or physical change within a recording medium, such that further layers can be recorded without causing interference. Ideally the chemical/physical change in the material should be reversible to enable erasable/rewritable data storage. In order to create a highly localised effect nonlinear excitation can be used; whereby the excitation is limited to a small region around the focal spot. Depending on the material and recording method there are several techniques for reading the information such as transmission imaging or reflection confocal microscopy. However, all the recording and reading methods require focusing to a deep position within a recording medium, such focusing encounters spherical aberration as a result of the difference in the refractive indices between the immersion and recording media. This thesis has concentrated on several areas to understand and develop the concept of three-dimensional bit optical data storage. The photorefractive effect in crystals has been studied for many years and is now widely used in optoelectronic devices. The use of photorefractive polymers is a relatively new and exciting development in optical data storage. Until now they have been used solely in the area of holographic data storage. The research in this thesis was conducted using photorefractive materials that were fabricated in two polymer matrices, poly(N-vinylcarbazole) (PVK) and poly(Methyl Methacrylate) (PMMA). The recording samples also consisted of the following compounds in various proportions, 2,5-dimethyl-4-(p-nirtophenylazo)anisole (DMNPAA), 2,4,7-trinitro-9-fluorenone (TNF) and N-ethylcarbazole (ECZ). In this project two-photon excitation was used as the recording mechanism to achieve erasable/rewritable data storage in a photorefractive polymer. As a result of two-photon excitation, the quadratic dependence of excitation on the incident intensity produces an excitation volume that is confined to the focal region in both the transverse and axial directions. Therefore, focusing the laser beam above or below its previous position provides a method by which layers of information can be recorded in the depth direction of a material, without causing interference from neighbouring layers. The feasibility of two-photon excitation in photorefractive polymers is demonstrated in this thesis. The quadratic relationship between excitation and incident light in two-photon excitation requires high photon density to ensure efficient excitation. The use of ultra-short pulsed lasers, while effective, is not a practical solution for an optical data storage system. This thesis demonstrates the ability to produce three-dimensional erasable/rewritable data storage in a photorefractive polymer using continuous wave illumination. Using this technology it has been possible to achieve a density of 88 Gbits/cm3, which corresponds to a capacity of 670 Gbytes on a compact disc sized recording medium. This is an increase of 1000 times the capacity of a CD and 130 times the capacity of current DVDs. While erasable optical data storage is an exciting prospect there are problems associated with the deterioration of the information. For long term information storage a permanent recording process would be more practical. It is demonstrated that there is a point after which further increases in the recording power result in the formation of a micro-cavity. While two-photon excitation is the recording method for erasable data storage, the increase in power results in an increase in ultra-violet absorption such that multi-photon excitation may occur. This thesis demonstrates the ability to record multi-layered arrays of micro-cavities. The change in refractive index associated with an erasable bit is less than 1%. As a result only phase sensitive reading methods (transmission imaging or differential interference contrast (DIC) microscopy) can be used to image a recorded bit. Both transmission and DIC imaging systems have poor axial resolution and therefore limit the density of the recording system, as well as being large optical systems. The introduction of a split or quadrant detector reduces the size of the optical reading system and is demonstrated to be sensitive enough to detect the phase changes of a recorded bit. However, the change in refractive index across a micro-cavity is large enough that reflection confocal microscopy can be used to detect a bit. It is demonstrated in this thesis that multi-layered micro-cavity arrays can be read using reflection confocal microscopy. Focusing of light to deep positions within an optical thick recording medium has the effect of increasing spherical aberration resulting from the refractive index mismatching between the immersion and recording media. The work in this thesis illustrates the effect of spherical aberration on the performance of both the recording and reading systems. The work conducted in this thesis shows the ability to record multi-layered erasable/rewritable information in a photorefractive polymer using pulsed and continuous wave two-photon excitation. It has also been demonstrated that through multi-photon excitation multi-layered micro-cavity arrays can be fabricated. It has also been illustrated that while spherical aberration deteriorates the performance of the recording and reading systems it is possible to achieve a density of greater than 88 Gbits/cm3.
APA, Harvard, Vancouver, ISO, and other styles
9

Rothman, Jonathan Sean. "A framework for the secure use of portable storage devices : a South African higher education perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1054.

Full text
Abstract:
South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
APA, Harvard, Vancouver, ISO, and other styles
10

Folmer, Brennan Thomas. "Metadata storage for file management systems data storage and representation techniques for a file management system /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1001141.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer storage devices"

1

H, Johnson Robert. DASD: IBM's direct access storage devices. New York: McGraw-Hill, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Books, Time-Life, ed. Memory and storage. Alexandria, Va: Time-Life Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Don, Anderson. SATA storage technology. Colorado Springs, CO: MindShare Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ranade, Sanjay. Jukebox and robotic libraries for computer mass storage. Westport: Meckler, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fong, Norman. FWB's guide to storage. 2nd ed. Menlo Park, Calif: FWB, Inc., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cloar, Patricia. Mass storage systems: Developments and trends. Norwalk, CT: Business Communications Co., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aven, Oleg Ivanovich. Stochastic analysis of computer storage. Dordrecht: Reidel, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Miller, Howard W. The system-managed storage guide. Byfield, Mass. (136 Orchard St., Byfield 01922-1605): Information Technology Institute, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cahoon, R. Michael. High performance storage system at Sandia National Labs. [Washington, DC: National Aeronautics and Space Administration, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Farley, Marc. Building storage networks. Berkeley: Osborne/McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer storage devices"

1

König, Robert, Ueli Maurer, and Stefano Tessaro. "Abstract Storage Devices." In Lecture Notes in Computer Science, 341–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-95891-8_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mao, Chen. "Design of Computer Storage System Based on Cloud Computing." In Advances in Communication, Devices and Networking, 651–59. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1983-3_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kannan, Sudarsun, Karishma Babu, Ada Gavrilovska, and Karsten Schwan. "VStore++: Virtual Storage Services for Mobile Devices." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29336-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Je-Min, and Jin-Soo Kim. "AndroBench: Benchmarking the Storage Performance of Android-Based Mobile Devices." In Frontiers in Computer Education, 667–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27552-4_89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Judae, and Unil Yun. "Design of Noise Information Storage System Using IoT Devices." In Advances in Computer Science and Ubiquitous Computing, 878–82. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3023-9_136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Papagiannis, Anastasios, Giorgos Saloustros, Manolis Marazakis, and Angelos Bilas. "User-Space I/O for $$\mu $$ s-level Storage Devices." In Lecture Notes in Computer Science, 638–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46079-6_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tang, Xian, Na Li, and Qiang Ma. "ABR: An Optimized Buffer Replacement Algorithm for Flash Storage Devices." In Communications in Computer and Information Science, 136–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2053-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Obzherin, Yuriy E., Stanislav M. Sidorov, and Mikhail M. Nikitin. "Hidden Markov Model of Information System with Component-Wise Storage Devices." In Distributed Computer and Communication Networks, 354–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36614-8_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Youhui, and Weimin Zheng. "An Object-Oriented Data Storage System on Network-Attached Object Devices." In Advances in Computer Systems Architecture, 527–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30102-8_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kłos, Mateusz, and Imed El Fray. "Model of Secure Data Storage in the Cloud for Mobile Devices." In Computer Information Systems and Industrial Management, 449–60. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99954-8_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer storage devices"

1

Buriak, Serhii. "Computer Modeling of Lithium-Ion Electrical Energy Storage Devices." In 2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT). IEEE, 2023. http://dx.doi.org/10.1109/csit61576.2023.10324258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Longyun, Wei Liu, Xiao Zhang, Baohua Zhao, Ke Li, Xiangnan Li, Hui Wang, and Jiangnnan Lin. "Authentication storage scheme based on trusted embedded devices." In International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023), edited by Lin Wang and Xiaogang Liu. SPIE, 2023. http://dx.doi.org/10.1117/12.2679704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khatib, M. G., and P. H. Hartel. "Policies for probe-wear leveling in MEMS-based storage devices." In amp; Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 2009. http://dx.doi.org/10.1109/mascot.2009.5366652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Xiaogang, Lidong Cai, Jialian Tu, Biao Wu, Taotao Peng, and Jiahang Yu. "Construction Methods, Devices, Computer Equipment and Storage Media of Temporary Entity Model." In 2023 International Seminar on Computer Science and Engineering Technology (SCSET). IEEE, 2023. http://dx.doi.org/10.1109/scset58950.2023.00087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Raihan, Md Iamul Arafat. "Impact of energy storage devices on reliability of distribution system." In 2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE). IEEE, 2016. http://dx.doi.org/10.1109/icecte.2016.7879630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saeed, Sameera Abubaker, Marghny Hassan Mohamed, and Mamdouh Farouk Mohamed. "Secure Storage of Data on Devices-Android based." In 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM). IEEE, 2021. http://dx.doi.org/10.1109/icsecs52883.2021.00084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chuanwen, Diansen Sun, Yunpeng Chai, and Fang Zhou. "Enabling Accurate Performance Isolation on Hybrid Storage Devices in Cloud Environment." In 2018 IEEE 36th International Conference on Computer Design (ICCD). IEEE, 2018. http://dx.doi.org/10.1109/iccd.2018.00090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kang, Dong Hyun, Changwoo Min, and Young Ik Eom. "An Efficient Buffer Replacement Algorithm for NAND Flash Storage Devices." In 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS. IEEE, 2014. http://dx.doi.org/10.1109/mascots.2014.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zainal Abidin, Muhammad Aiman, Noor Hazrin Hany Mohamad Hanif, and Mohamad Safiddin Mohd Tahir. "Energy Storage System For Dual Energy Harvester For Wearable Or Portable Devices." In 2021 8th International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2021. http://dx.doi.org/10.1109/iccce50029.2021.9467243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kurdi, Bülent. "Integrated optical data storage: from components and devices to systems." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1992. http://dx.doi.org/10.1364/oam.1992.mi2.

Full text
Abstract:
Optical data storage, which is currently based on small discrete optical components, has already established a place for itself in the computer data storage hierarchy. Optical storage offers high storage density, removability, and archival readonly and read/write functionality. It is in the area of read/write applications where comparable performance to magnetic data storage is expected from magneto-optical data storage systems. Integrated optics technology offers a reduction of optical head cost, size, mass, manufacturing complexity, and critical alignment tolerances by means of migration from the assembly of miniature but discrete optical components to planar-processed, self-aligned integrated optical elements. After a brief description of a generic discrete component magnetooptical head, recent developments in the area of integrated optical head concepts will be reviewed. Antiresonant reflecting optical waveguide (ARROW) structures and a crossed-grating structure for performing magneto-optical (MO) polarization detection will be presented. The issues of waveguide and grating fabrication, efficient waveguide and detector coupling, and packaging and integration challenges will be discussed.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer storage devices"

1

Galili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, October 1994. http://dx.doi.org/10.32747/1994.7570549.bard.

Full text
Abstract:
The objectives of this project were to develop nondestructive methods for detection of internal properties and firmness of fruits and vegetables. One method was based on a soft piezoelectric film transducer developed in the Technion, for analysis of fruit response to low-energy excitation. The second method was a dot-matrix piezoelectric transducer of North Carolina State University, developed for contact-pressure analysis of fruit during impact. Two research teams, one in Israel and the other in North Carolina, coordinated their research effort according to the specific objectives of the project, to develop and apply the two complementary methods for quality control of agricultural commodities. In Israel: An improved firmness testing system was developed and tested with tropical fruits. The new system included an instrumented fruit-bed of three flexible piezoelectric sensors and miniature electromagnetic hammers, which served as fruit support and low-energy excitation device, respectively. Resonant frequencies were detected for determination of firmness index. Two new acoustic parameters were developed for evaluation of fruit firmness and maturity: a dumping-ratio and a centeroid of the frequency response. Experiments were performed with avocado and mango fruits. The internal damping ratio, which may indicate fruit ripeness, increased monotonically with time, while resonant frequencies and firmness indices decreased with time. Fruit samples were tested daily by destructive penetration test. A fairy high correlation was found in tropical fruits between the penetration force and the new acoustic parameters; a lower correlation was found between this parameter and the conventional firmness index. Improved table-top firmness testing units, Firmalon, with data-logging system and on-line data analysis capacity have been built. The new device was used for the full-scale experiments in the next two years, ahead of the original program and BARD timetable. Close cooperation was initiated with local industry for development of both off-line and on-line sorting and quality control of more agricultural commodities. Firmalon units were produced and operated in major packaging houses in Israel, Belgium and Washington State, on mango and avocado, apples, pears, tomatoes, melons and some other fruits, to gain field experience with the new method. The accumulated experimental data from all these activities is still analyzed, to improve firmness sorting criteria and shelf-life predicting curves for the different fruits. The test program in commercial CA storage facilities in Washington State included seven apple varieties: Fuji, Braeburn, Gala, Granny Smith, Jonagold, Red Delicious, Golden Delicious, and D'Anjou pear variety. FI master-curves could be developed for the Braeburn, Gala, Granny Smith and Jonagold apples. These fruits showed a steady ripening process during the test period. Yet, more work should be conducted to reduce scattering of the data and to determine the confidence limits of the method. Nearly constant FI in Red Delicious and the fluctuations of FI in the Fuji apples should be re-examined. Three sets of experiment were performed with Flandria tomatoes. Despite the complex structure of the tomatoes, the acoustic method could be used for firmness evaluation and to follow the ripening evolution with time. Close agreement was achieved between the auction expert evaluation and that of the nondestructive acoustic test, where firmness index of 4.0 and more indicated grade-A tomatoes. More work is performed to refine the sorting algorithm and to develop a general ripening scale for automatic grading of tomatoes for the fresh fruit market. Galia melons were tested in Israel, in simulated export conditions. It was concluded that the Firmalon is capable of detecting the ripening of melons nondestructively, and sorted out the defective fruits from the export shipment. The cooperation with local industry resulted in development of automatic on-line prototype of the acoustic sensor, that may be incorporated with the export quality control system for melons. More interesting is the development of the remote firmness sensing method for sealed CA cool-rooms, where most of the full-year fruit yield in stored for off-season consumption. Hundreds of ripening monitor systems have been installed in major fruit storage facilities, and being evaluated now by the consumers. If successful, the new method may cause a major change in long-term fruit storage technology. More uses of the acoustic test method have been considered, for monitoring fruit maturity and harvest time, testing fruit samples or each individual fruit when entering the storage facilities, packaging house and auction, and in the supermarket. This approach may result in a full line of equipment for nondestructive quality control of fruits and vegetables, from the orchard or the greenhouse, through the entire sorting, grading and storage process, up to the consumer table. The developed technology offers a tool to determine the maturity of the fruits nondestructively by monitoring their acoustic response to mechanical impulse on the tree. A special device was built and preliminary tested in mango fruit. More development is needed to develop a portable, hand operated sensing method for this purpose. In North Carolina: Analysis method based on an Auto-Regressive (AR) model was developed for detecting the first resonance of fruit from their response to mechanical impulse. The algorithm included a routine that detects the first resonant frequency from as many sensors as possible. Experiments on Red Delicious apples were performed and their firmness was determined. The AR method allowed the detection of the first resonance. The method could be fast enough to be utilized in a real time sorting machine. Yet, further study is needed to look for improvement of the search algorithm of the methods. An impact contact-pressure measurement system and Neural Network (NN) identification method were developed to investigate the relationships between surface pressure distributions on selected fruits and their respective internal textural qualities. A piezoelectric dot-matrix pressure transducer was developed for the purpose of acquiring time-sampled pressure profiles during impact. The acquired data was transferred into a personal computer and accurate visualization of animated data were presented. Preliminary test with 10 apples has been performed. Measurement were made by the contact-pressure transducer in two different positions. Complementary measurements were made on the same apples by using the Firmalon and Magness Taylor (MT) testers. Three-layer neural network was designed. 2/3 of the contact-pressure data were used as training input data and corresponding MT data as training target data. The remaining data were used as NN checking data. Six samples randomly chosen from the ten measured samples and their corresponding Firmalon values were used as the NN training and target data, respectively. The remaining four samples' data were input to the NN. The NN results consistent with the Firmness Tester values. So, if more training data would be obtained, the output should be more accurate. In addition, the Firmness Tester values do not consistent with MT firmness tester values. The NN method developed in this study appears to be a useful tool to emulate the MT Firmness test results without destroying the apple samples. To get more accurate estimation of MT firmness a much larger training data set is required. When the larger sensitive area of the pressure sensor being developed in this project becomes available, the entire contact 'shape' will provide additional information and the neural network results would be more accurate. It has been shown that the impact information can be utilized in the determination of internal quality factors of fruit. Until now,
APA, Harvard, Vancouver, ISO, and other styles
2

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography