Journal articles on the topic 'Computer storage devices'

To see the other types of publications on this topic, follow the link: Computer storage devices.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer storage devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rarath, Darshana, Mayank Sharma, Akshay Mane, Pooja Dabral, and Roshani Raut. "Computer Independent Data Transfer Device." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 2 (July 6, 2017): 72. http://dx.doi.org/10.3991/ijes.v5i2.7038.

Full text
Abstract:
<p class="IEEEAbtract"><span lang="EN-GB">In today’s era, </span><span lang="EN-GB">transferring data among distinct storage devices has become one of the tasks which are done most frequently. In order to make data and information omnipresent, it needs to be shared anywhere and anytime. However the reliance of user on a PC or laptop for the same is not efficient. This paper is about the innovative way to overcome this restriction. This paper discusses the development of a portable device with the use of wired and wireless communication applications to share data and information among distinct storage devices without relying on a PC or a laptop. The proposed device is compact, comprises of a touch screen, power source and is capable of transferring all types of files. Hence, it eliminates the dependence on a PC or a laptop for transferring data.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
2

POTTER, SHAYA, OREN LAADAN, RICARDO BARATTO, LEONARD KIM, and JASON NIEH. "MEDIAPOD: A POCKET-SIZED AND PERSONALIZED MULTIMEDIA DESKTOP." International Journal of Semantic Computing 04, no. 02 (June 2010): 181–202. http://dx.doi.org/10.1142/s1793351x10001000.

Full text
Abstract:
We present MediaPod, a portable system that allows mobile users to maintain the same persistent, personalized multimedia desktop environment on any available computer. Regardless of which computer is being used, MediaPod provides a consistent multimedia desktop session, maintaining all of a user's applications, documents and configuration settings. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. MediaPod provides a virtualization and checkpoint-restart mechanism that decouples a desktop environment and its applications from the host, enabling multimedia desktop sessions to be suspended to portable storage, carried around, and resumed from the storage device on another computer. MediaPod virtualization also isolates desktop sessions from the host, protecting the privacy of the user and preventing malicious applications from damaging the host. We have implemented a Linux MediaPod prototype and demonstrate its ability to quickly suspend and resume multimedia desktop sessions, enabling a seamless computing experience for mobile users as they move among computers.
APA, Harvard, Vancouver, ISO, and other styles
3

Sassani (Sarrafpour), Bahman A., Mohammed Alkorbi, Noreen Jamil, M. Asif Naeem, and Farhaan Mirza. "Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices." Scientific Programming 2020 (May 31, 2020): 1–9. http://dx.doi.org/10.1155/2020/6132312.

Full text
Abstract:
Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
4

Oriz-Lombardia, Mifuel, and Chandra S. Verma. "Proteins as data storage devices: insights from computer models." Journal of Physics: Conference Series 34 (April 1, 2006): 7–14. http://dx.doi.org/10.1088/1742-6596/34/1/002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salamat, Sahand, Hui Zhang, Yang Seok Ki, and Tajana Rosing. "NASCENT2: Generic Near-Storage Sort Accelerator for Data Analytics on SmartSSD." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–29. http://dx.doi.org/10.1145/3472769.

Full text
Abstract:
As the size of data generated every day grows dramatically, the computational bottleneck of computer systems has shifted toward storage devices. The interface between the storage and the computational platforms has become the main limitation due to its limited bandwidth, which does not scale when the number of storage devices increases. Interconnect networks do not provide simultaneous access to all storage devices and thus limit the performance of the system when executing independent operations on different storage devices. Offloading the computations to the storage devices eliminates the burden of data transfer from the interconnects. Near-storage computing offloads a portion of computations to the storage devices to accelerate big data applications. In this article, we propose a generic near-storage sort accelerator for data analytics, NASCENT2, which utilizes Samsung SmartSSD, an NVMe flash drive with an on-board FPGA chip that processes data in situ. NASCENT2 consists of dictionary decoder, sort, and shuffle FPGA-based accelerators to support sorting database tables based on a key column with any arbitrary data type. It exploits data partitioning applied by data processing management systems, such as SparkSQL, to breakdown the sort operations on colossal tables to multiple sort operations on smaller tables. NASCENT2 generic sort provides 2 × speedup and 15.2 × energy efficiency improvement as compared to the CPU baseline. It moreover considers the specifications of the SmartSSD (e.g., the FPGA resources, interconnect network, and solid-state drive bandwidth) to increase the scalability of computer systems as the number of storage devices increases. With 12 SmartSSDs, NASCENT2 is 9.9× (137.2 ×) faster and 7.3 × (119.2 ×) more energy efficient in sorting the largest tables of TPCC and TPCH benchmarks than the FPGA (CPU) baseline.
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, encompass a variety of entities ranging from personal computers and phones to servers and networking hardware. Computer networks enable various applications to access resources such as the World Wide Web, shared application and storage servers, printers, fax machines, as well as email and instant messaging applications. They play a pivotal role in facilitating information sharing across diverse tasks.Computer networks can be classified into two types: open systems and closed systems. Open systems are easily connected to networks and are primed for communication. Conversely, closed systems require proper authentication and are not as readily connected to other networks..
APA, Harvard, Vancouver, ISO, and other styles
7

Watson, Ian. "Securing portable storage devices." Network Security 2006, no. 7 (July 2006): 8–11. http://dx.doi.org/10.1016/s1353-4858(06)70410-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thangavel, Vijayakumar. "Survey on Computer Forensics and its most using Technique Steganography." December 2023 2, no. 2 (December 2023): 425–34. http://dx.doi.org/10.36548/rrrj.2023.2.013.

Full text
Abstract:
A subfield of digital forensic science called computer forensics deals with evidence discovered on computers and digital storage devices. Computer forensics aims to detect, preserve, retrieve, analyse and communicate facts and views regarding the digital information by performing a forensically sound examination of digital media. The purpose of this study is to provide a brief discussion of computer forensics and related methods. Steganography is one of the most widely utilised of these approaches, and it will also be briefly discussed below.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Bixin, Shiyang Zhang, Lan Xu, Qiong Su, and Bin Du. "Emerging Robust Polymer Materials for High-Performance Two-Terminal Resistive Switching Memory." Polymers 15, no. 22 (November 10, 2023): 4374. http://dx.doi.org/10.3390/polym15224374.

Full text
Abstract:
Facing the era of information explosion and the advent of artificial intelligence, there is a growing demand for information technologies with huge storage capacity and efficient computer processing. However, traditional silicon-based storage and computing technology will reach their limits and cannot meet the post-Moore information storage requirements of ultrasmall size, ultrahigh density, flexibility, biocompatibility, and recyclability. As a response to these concerns, polymer-based resistive memory materials have emerged as promising candidates for next-generation information storage and neuromorphic computing applications, with the advantages of easy molecular design, volatile and non-volatile storage, flexibility, and facile fabrication. Herein, we first summarize the memory device structures, memory effects, and memory mechanisms of polymers. Then, the recent advances in polymer resistive switching materials, including single-component polymers, polymer mixtures, 2D covalent polymers, and biomacromolecules for resistive memory devices, are highlighted. Finally, the challenges and future prospects of polymer memory materials and devices are discussed. Advances in polymer-based memristors will open new avenues in the design and integration of high-performance switching devices and facilitate their application in future information technology.
APA, Harvard, Vancouver, ISO, and other styles
10

Mladenov, G., V. Spivak, E. Koleva, A. Bogdan, and S. Zelensky. "Micro-and nanostructures in modern memory devices." Electronics and Communications 16, no. 2 (March 28, 2011): 5–8. http://dx.doi.org/10.20535/2312-1807.2011.16.2.267720.

Full text
Abstract:
Electronic storage devices are an important part of modern information and communication systems, defining the parameters and possibilities of the whole system. In this paper it is shown the operating principle and parameters of dynamic random-access storage media, working as operative memory in computer systems as well as the flash-memories, wide and successive used as input and output of data and to keep it out of information systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Ademulegun, Oluwasola O., Patrick Keatley, Motasem Bani Mustafa, and Neil J. Hewitt. "Energy Storage on a Distribution Network for Self-Consumption of Wind Energy and Market Value." Energies 13, no. 11 (May 26, 2020): 2688. http://dx.doi.org/10.3390/en13112688.

Full text
Abstract:
Wind energy could be generated and captured with a storage device within the customer premises for local utilization and for the provision of various services across the electricity supply chain. To assess the benefits of adding a storage device to an electricity distribution network that has two wind turbines with a base load of 500 kW and a typical peak load under 1500 kW, a 2 MW/4 MWh storage is installed. To observe the effects of adding the storage device to the network, a technical analysis is performed using the NEPLAN 360 modelling tool while an economic analysis is carried out by estimating the likely payback period on investment. A storage potential benefit analysis suggests how changes in integration policies could affect the utility of adding the storage device. With the addition of the storage device, self-consumption of wind energy increased by almost 10%. The profitability of the project increased when the device is also deployed to provide stacked services across the electricity supply chain. Policies that permit the integration of devices into the grid could increase the profitability of storage projects.
APA, Harvard, Vancouver, ISO, and other styles
12

Vidya S, Et al. "Cloud-Based Integrated Cross-Platform Regional Medical Image Cooperative Storage System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (April 30, 2023): 409–12. http://dx.doi.org/10.17762/ijritcc.v11i4.9851.

Full text
Abstract:
With the increasing volume of medical image data, efficient storage and retrieval of these images have become critical in the healthcare industry. This paper proposes an integrated cross-platform regional medical image cooperative storage system based on cloud computing. The system comprises a storage layer, a basic management layer, an application interface layer, and an access layer. The storage layer consists of medical image storage devices and a storage device management system. The basic management layer facilitates the collaborative operation of multiple storage devices within the medical image cloud storage. The application interface layer assigns permissions to users based on their needs. The access layer allows users to access the medical image cloud storage system. This system aims to provide a cost-effective, high-availability solution for storing and accessing a large volume of medical images. The research objective is to realize rapid storage and retrieval of medical images, satisfying the needs of healthcare professionals. The findings demonstrate the practical significance of the system and its potential to enhance medical image management.
APA, Harvard, Vancouver, ISO, and other styles
13

WANG, JEN-YA, and JR-SHIAN CHEN. "A DATA PARTITION METHOD FOR MEMS-BASED STORAGE DEVICES IN A DISTRIBUTED COMPUTING ENVIRONMENT." International Journal of Software Engineering and Knowledge Engineering 23, no. 01 (February 2013): 101–15. http://dx.doi.org/10.1142/s021819401340007x.

Full text
Abstract:
This paper aims to minimize power consumption and sustain customer satisfaction for a datacenter. In some distributed computing environments, especially in a cloud computing environment, the most concerned issue for a datacenter designer is power consumption instead of its speed. This is because the storage devices always consume much electricity. To save power, we can assign to each device proper workload and turn off some spare devices. Therefore, partitioning data and allocating them among the storage devices becomes the first priority. However, due to some complex constraints, the data partition problem is very time-consuming or even NP-hard. Therefore, we propose a gradient-based method to deal with the problem. The novelty of the proposed method lies in that the discretized combinatorial problem is solved by a calculus-based technique. Experimental results show that significant energy is saved by shutting down as many uncalled-for devices as possible. The results also suggest that other similar optimization problems can be solved by the linearly-convergent method.
APA, Harvard, Vancouver, ISO, and other styles
14

Kim, Hae Jin. "Recent Progress of the Cation Based Conductive Bridge Random Access Memory." Ceramist 26, no. 1 (March 31, 2023): 90–105. http://dx.doi.org/10.31613/ceramist.2023.26.1.07.

Full text
Abstract:
Demand for new computing systems equipped with ultra-high-density memory storage and new computer architecture is rapidly increasing with the tremendous increment of the amount of data produced and/or reproduced. In particular, the requirement for technology development is growing as conventional storage devices face the physical limitations for scaling down and the data bottleneck that the Von Neumann architecture increases. Among the recent emerging memory devices, the conductive bridge random access memory (CBRAM) has superior switching properties and excellent scalability to be adopted as the next-generation storage device and as the hardware implementation of the neuromorphic computing system. In this review, the previous papers on the resistive switching mechanism of CBRAM and the precedent CBRAM devices exploiting various materials proposed by many research groups are introduced. The principle of CBRAM is discussed including the operation mechanism, switching materials, and the challenges that need to be solved. A wide selection of materials including metal oxides, Chalcogenides, and other non-oxides have been examined as the electrolyte layer of the CBRAM. Various switching materials, device engineering, and material innovation approaches were introduced, and the research results for solving the problems of CBRAM were reviewed in depth.
APA, Harvard, Vancouver, ISO, and other styles
15

Santiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (January 29, 2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.

Full text
Abstract:
ABSTRAK Cloud Computing atau komputasi awan adalah gabungan pemanfaatan teknologi komputer ('komputasi') dan pengembangan berbasis Internet ('awan'). Awan (cloud) adalah metafora dari internet, sebagaimana awan yang sering digambarkan pada diagram jaringan computer. Selain seperti awan dalam diagram jaringan komputer, awan (cloud) dalam cloud computing juga merupakan abstraksi dari infrastuktur kompleks yang disembunyikannya. Private Cloud Storage dengan kolaborasi komponen Service Oriented Architecture mampu menyediakan antarmuka yang efisien untuk proses berjalannya lembaga dan berfungsi sebagai Virtualization Server dan Online Storage yang dapat diakses menggunakan Fixed Device dan Mobile Device seperti Smartphone Android, Komputer Pad, dan PC Tablet melalui koneksi jaringan lokal dan internet.Sebagai fungsi manfaat dari cloud sendiri bisa di manfaatkan kedalam kebutuhan E-Learning, mengingat dari segi kemudahan, kebutuhan, dan keamanan, cloud computing terbilang metode yang pas dalam menerapkan kebutuhan tersebut. Dimana setiap data berhak di simpan secara bebas, luas dan aman tentunya. ABSTRACT Cloud Computing is a combination of the use of computer technology and cloud of Internet-based development. Clouds are metaphors of the Internet, as are clouds that are often depicted in computer network diagrams. In addition to clouds in computer network diagrams, clouds in computing technology are also an abstraction of the complex infrastructure it conceals. Private Cloud Storage with Service Oriented Architecture component collaboration is able to provide an efficient interface for the running process of the institution and serves as Virtualization Server and Online Storage that can be accessed using Fixed Devices and Mobile Devices such as Android Smartphone, Pad Computer and Tablet PC via local network connection and Internet.As function of the benefits of the cloud itself can be utilized into the needs of E-Learning, given the ease, needs, and security, cloud computing spelled out the right method in applying these needs. Where every data is entitled to save freely, broadly and safely of course.How to Cite : Santiko, I. Rosidi, R., Wibawa. S. A (2017). PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN. Jurnal Teknik Informatika, 10(2), 137-146. doi:10.15408/jti.v10i2.6992Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.6992
APA, Harvard, Vancouver, ISO, and other styles
16

Bansal, Malti, and Harshit. "IoT based Edge Computing." December 2020 2, no. 4 (January 5, 2021): 204–10. http://dx.doi.org/10.36548/jtcsst.2020.4.005.

Full text
Abstract:
Edge computing is a new way of calculating where most computer and storage devices are located on the internet, near mobile devices, sensors, end users, and internet of things devices. This physical approach improves delays, bandwidth, trust and survival.
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Hwi-Ho, Jung-Hyok Kwon, and Eui-Jik Kim. "Design and Implementation of Virtual Private Storage Framework Using Internet of Things Local Networks." Symmetry 12, no. 3 (March 24, 2020): 489. http://dx.doi.org/10.3390/sym12030489.

Full text
Abstract:
This paper presents a virtual private storage framework (VPSF) using Internet of Things (IoT) local networks. The VPSF uses the extra storage space of sensor devices in an IoT local network to store users’ private data, while guaranteeing expected network lifetime, by partitioning the storage space of a sensor device into data and system volumes and, if necessary, logically integrating the extra data volumes of the multiple sensor devices to virtually build a single storage space. When user data need to be stored, the VPSF gateway divides the original data into several blocks and selects the sensor devices in which the blocks will be stored based on their residual energy. The blocks are transmitted to the selected devices using the modified speedy block-wise transfer (BlockS) option of the constrained application protocol (CoAP), which reduces communication overhead by retransmitting lost blocks without a retransmission request message. To verify the feasibility of the VPSF, an experimental implementation was conducted using the open-source software libcoap. The results demonstrate that the VPSF is an energy-efficient solution for virtual private storage because it averages the residual energy amounts for sensor devices within an IoT local network and reduces their communication overhead.
APA, Harvard, Vancouver, ISO, and other styles
18

Yesmagambetov, Bulat-Batyr, Akhmetbek Mussabekov, Nurlybek Alymov, Abdulkhak Apsemetov, Madina Balabekova, Kamil Kayumov, Kuttybek Arystanbayev, and Aigul Imanbayeva. "Determination of Characteristics of Associative Storage Devices in Radio Telemetry Systems with Data Compression." Computation 11, no. 6 (June 6, 2023): 111. http://dx.doi.org/10.3390/computation11060111.

Full text
Abstract:
In the radio telemetry systems of spacecraft, various data compression methods are used for data processing. When using any compression methods, the data obtained as a result of compression is formed randomly, and transmission over radio communication channels should be carried out evenly over time. This leads to the need to use special buffer storage devices. In addition, existing spacecraft radio telemetry systems require grouping of compressed data streams by certain characteristics. This leads to the need to sort compressed data by streams. Therefore, it is advisable to use associative buffer storage devices in such systems. This article is devoted to the analysis of the processes of formation of output streams of compressed data generated at the output of an associative storage device (ASD). Since the output stream of compressed data is random, queue theory and probability theory are used for analysis. At the same time, associative memory is represented as a queue system. Writing and reading in an ASD can be interpreted as servicing orders in a queue system. The purpose of the analysis is to determine the characteristics of an associative storage device (ASD). Such characteristics are the queue length M{N} in the ASD, the deviation of the queue length D{N} in the ASD and the probability pn of a given volume n of compressed data in the ASD (including the probability of emptying and the probability of memory overflow). The results obtained are of great practical importance, since they can be used to select the amount of memory of an associative storage device (ASD) when designing compression devices for telemetry systems of spacecraft.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Chen, Yong Wang, and Tao Yang. "Iterative Auction for P2P Renewable Energy Trading with Dynamic Energy Storage Management." Energies 13, no. 18 (September 22, 2020): 4963. http://dx.doi.org/10.3390/en13184963.

Full text
Abstract:
In this paper, a peer-to-peer (P2P) renewable energy trading mechanism for microgrids when energy suppliers are equipped with storage devices is studied. A dynamic energy storage management strategy based on the local trading price is proposed and each supplier decides the amount of energy to be sold and stored in real time. An iterative auction algorithm is presented to obtain the market equilibrium and optimal energy allocation schedule. The economic analysis of introducing energy storage devices in this trading market is further studied. Numerical examples of two 7 × 24-h energy trading scenarios with 20 consumers and 20 solar energy producers are used to illustrate the feasibility of this proposed trading mechanism, with sensitivity analysis of different parameters on social welfare. A comparison of the hourly optimal local trading price of these two markets is demonstrated to explain the dynamic process. It is found that in those days with high solar radiation, compared with the market with no storage device, the total cost for buyers in the market when storage devices are used shows a decline of 1.52% and the total profit for sellers shows an increase of 1.27%, which leads to a substantial relative improvement of 118.94% in the overall social welfare. Moreover, a brief economic analysis shows that the advantage of using energy storage in this example is guaranteed after five years of operation. Longer operation time does not mean more benefits considering the deterioration of battery packs and increase of operation and maintenance costs, and the profit reaches its maximum value at the 15th year.
APA, Harvard, Vancouver, ISO, and other styles
20

Yoo, Jang, Kim, Nam, Yoon, and Jung. "Accuracy Improvement Method of Energy Storage Utilization with DC Voltage Estimation in Large-Scale Photovoltaic Power Plants." Energies 12, no. 20 (October 15, 2019): 3907. http://dx.doi.org/10.3390/en12203907.

Full text
Abstract:
In regard to electric devices, currently designed large-scale distributed generation systems require a precise prediction strategy based on the composition of internal component owing to an environmental fluctuating condition and forecasted power variation. A number of renewable resources, such as solar or marine based energies, are made up of a low voltage direct current (DC) network. In addition to actively considering a power compensation plan, these generation systems have negative effects, which can be induced to a connected power system. When a storage is connected to a DC-based generation system on an inner network along with other generators, a precise state analysis plan should back the utilization process. This paper presents a cooperative operating condition, consisting of the shared DC section, which includes photovoltaic (PVs) and energy storage devices. An active storage management plan with voltage-expectation is introduced and compared via a commercialized electro-magnetic transient simulation tool with designed environmental conditions. Owing to their complexity, the case studies were sequentially advanced by dividing state analysis verification and storage device operation.
APA, Harvard, Vancouver, ISO, and other styles
21

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Full text
Abstract:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
22

Sebastian, Alycia, and K. Siva Sankar. "A secure and reliable method to protect usb data." APTIKOM Journal on Computer Science and Information Technologies 4, no. 2 (January 27, 2020): 57–60. http://dx.doi.org/10.34306/csit.v4i2.91.

Full text
Abstract:
With technology advancement people have started using different type of memory devices for storing dataand keeping it secure has become concern in today’s world. Universal Serial Bus (USB) flash drives are leadingportable storage device for storage and easy transfer of data from one computer to another. The usage of USB hasgrown exponentially and without security the data on the disk is at risk. Nowadays USB manufacturers offer passwordprotection and fingerprint authentication to secure the USB data. In this paper, USB is devised as a highly securedportable boot medium with fingerprint authentication to secure the data.
APA, Harvard, Vancouver, ISO, and other styles
23

Santa, José, Pedro J. Fernández, Ramon Sanchez-Iborra, Jordi Ortiz, and Antonio F. Skarmeta. "Offloading Positioning onto Network Edge." Wireless Communications and Mobile Computing 2018 (October 23, 2018): 1–13. http://dx.doi.org/10.1155/2018/7868796.

Full text
Abstract:
While satellite or cellular positioning implies dedicated hardware or network infrastructure functions, indoor navigation or novel IoT positioning techniques include flexible storage and computation requirements that can be fulfilled by both end-devices or cloud back-ends. Hybrid positioning systems support the integration of several algorithms and technologies; however, the common trend of delegating position calculation and storage of local geoinformation to mobile devices or centralized servers causes performance degradation in terms of delay, battery usage, and waste of network resources. The strategy followed in this work is offloading this computation effort onto the network edge, following a Mobile Edge Computing (MEC) approach. MEC nodes in the access network of the mobile device are in charge of receiving navigation data coming from both the smart infrastructure and mobile devices, in order to compute the final position following a hybrid approach. With the aim of supporting mobility and the access to multiple networks, an Information Centric Networking (ICN) solution is used to access generic position information resources. The presented system currently supports WiFi, Bluetooth LE, GPS, cellular and NFC technologies, involving both indoor and outdoor positioning, using fingerprinting and proximity for indoor navigation, and the integration of smart infrastructure data sources such as the door opening system within real smart campus deployment. Evaluations carried out reveal latency improvements of 50%, as compared with a regular configuration where position fixes are computed by mobile devices; at the same time the MEC solution offers extra flexibility features to manage positioning databases and algorithms and move extensive computation from constrained devices to the edge.
APA, Harvard, Vancouver, ISO, and other styles
24

Prathap Naik, Mude Gnani. "CARBON NANOTUBE COMPUTER." International Journal of Engineering Applied Sciences and Technology 7, no. 7 (November 1, 2022): 172–75. http://dx.doi.org/10.33564/ijeast.2022.v07i07.027.

Full text
Abstract:
Many potential applications have been proposed for carbon nanotubes, including conductive and high-strength composites; energy storage and energy conversion devices; sensors; field emission displays and radiation sources; hydrogen storage media; and probes, and interconnects. Some of these applications are now realized in products. Others are demonstrated in early to advanced devices, and nanometer-sized semiconductor devices is one such application. Nanotube cost, polydispersity in nanotube type, and limitations in processing and assembly methods are important barriers for some applications of single-walled nanotubes. Problem is, carbon nanotubes aren't perfect either. They don't always grow in perfectly straight lines, and a fraction of the tubes grown aren't able to "switch off" like a regular transistor. The Stanford team used a technique of "burning" off some of the imperfect carbon nanotubes while also working their way around other imperfections by using a complex algorithm. They do not, for example, always grow in parallel lines, which has led researchers to devise techniques to grow 99.5 percent of CNTs in straight lines, according to the press release. But with billions of nanotubes on a chip, even a small misalignment of the tubes can cause errors. A fraction of the CNTs also behave like metallic wires that always conduct electricity, instead of acting like semiconductors that can be switched off. The final design consists of a very basic computer with 178 transistors that can do tasks like counting and number sorting and switch between functions. The rise of carbon nanotube computers in the future is for sure and the basic algorithm to prove this concept is illustrated in depth. CNTs are prominent among a variety of emerging technologies that are being considered for the next generation of highly energy efficient electronic systems.This may take some time to make this kind of computer designed by using nanotubes available for all but once it is developed it is going to lead to a new era in the world of computers.
APA, Harvard, Vancouver, ISO, and other styles
25

Ardiansyah, Muhammad Fahri, Tengku Mohd Diansyah, and Risko Liza. "Penggunaan Set top box Bekas untuk Dimanfaatkan sebagai Cloud Server." Blend Sains Jurnal Teknik 1, no. 2 (September 14, 2022): 88–96. http://dx.doi.org/10.56211/blendsains.v1i2.115.

Full text
Abstract:
The utilization of data storage media is currently very necessary to support the progress process in the digital era as it is today. One of the hardware needed to build personal data storage is HDD. But there are times when users need extra storage space using the internet or using the cloud. However, not all users can afford to rent or build an adequate server for securing personal data storage. Not all users need a server infrastructure that has high specifications to meet their needs. set top box is a device in the single-board computer category that is widely circulated in Indonesia. Set top box devices can be obtained at an affordable price, but can be a server. This research develops data storage based on a samba server application on a set top box device. Testing was done to change the default set top box operating system to the Linux operating system, the results showed that used set top box devices can be used as mini servers, the results of all the tests carried out obtained a result, namely a comparison of RAM and storage usage between the Pulpstone operating system and the system. armbian Linux operation has an increase in total RAM usage. Armbian Linux is greater than Pulpstone RAM usage which has an increase of 7.4% of the total RAM usage of the Pulpstone operating system, and data storage of the armbian Linux operating system has an increase of 74.4% from the data storage of the Pulsptone operating system, so Operating system changes can affect the total usage of RAM and data storage on the operating system used on the set top box device.
APA, Harvard, Vancouver, ISO, and other styles
26

Coffman, E. G., and M. Hofri. "Queueing models of secondary storage devices." Queueing Systems 1, no. 2 (September 1986): 129–68. http://dx.doi.org/10.1007/bf01536186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Liu, Yang, Shan Zhao, Wenhan Chen, Xuran Ge, Fang Liu, Shuo Li, and Nong Xiao. "NVM Storage in IoT Devices: Opportunities and Challenges." Computer Systems Science and Engineering 38, no. 3 (2021): 393–409. http://dx.doi.org/10.32604/csse.2021.017224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Lu-Xing, and Xiaofan Yang. "The spread of computer viruses under the influence of removable storage devices." Applied Mathematics and Computation 219, no. 8 (December 2012): 3914–22. http://dx.doi.org/10.1016/j.amc.2012.10.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Guo, Yuanyuan, Yifan Xia, Jing Wang, Hui Yu, and Rung-Ching Chen. "Real-Time Facial Affective Computing on Mobile Devices." Sensors 20, no. 3 (February 6, 2020): 870. http://dx.doi.org/10.3390/s20030870.

Full text
Abstract:
Convolutional Neural Networks (CNNs) have become one of the state-of-the-art methods for various computer vision and pattern recognition tasks including facial affective computing. Although impressive results have been obtained in facial affective computing using CNNs, the computational complexity of CNNs has also increased significantly. This means high performance hardware is typically indispensable. Most existing CNNs are thus not generalizable enough for mobile devices, where the storage, memory and computational power are limited. In this paper, we focus on the design and implementation of CNNs on mobile devices for real-time facial affective computing tasks. We propose a light-weight CNN architecture which well balances the performance and computational complexity. The experimental results show that the proposed architecture achieves high performance while retaining the low computational complexity compared with state-of-the-art methods. We demonstrate the feasibility of a CNN architecture in terms of speed, memory and storage consumption for mobile devices by implementing a real-time facial affective computing application on an actual mobile device.
APA, Harvard, Vancouver, ISO, and other styles
30

S.K, Prashanthi, Sai Anuroop Kesanapalli, and Yogesh Simmhan. "Characterizing the Performance of Accelerated Jetson Edge Devices for Training Deep Learning Models." Proceedings of the ACM on Measurement and Analysis of Computing Systems 6, no. 3 (December 2022): 1–26. http://dx.doi.org/10.1145/3570604.

Full text
Abstract:
Deep Neural Networks (DNNs) have had a significant impact on domains like autonomous vehicles and smart cities through low-latency inferencing on edge computing devices close to the data source. However, DNN training on the edge is poorly explored. Techniques like federated learning and the growing capacity of GPU-accelerated edge devices like NVIDIA Jetson motivate the need for a holistic characterization of DNN training on the edge. Training DNNs is resource-intensive and can stress an edge's GPU, CPU, memory and storage capacities. Edge devices also have different resources compared to workstations and servers, such as slower shared memory and diverse storage media. Here, we perform a principled study of DNN training on individual devices of three contemporary Jetson device types: AGX Xavier, Xavier NX and Nano for three diverse DNN model--dataset combinations. We vary device and training parameters such as I/O pipelining and parallelism, storage media, mini-batch sizes and power modes, and examine their effect on CPU and GPU utilization, fetch stalls, training time, energy usage, and variability. Our analysis exposes several resource inter-dependencies and counter-intuitive insights, while also helping quantify known wisdom. Our rigorous study can help tune the training performance on the edge, trade-off time and energy usage on constrained devices, and even select an ideal edge hardware for a DNN workload, and, in future, extend to federated learning too. As an illustration, we use these results to build a simple model to predict the training time and energy per epoch for any given DNN across different power modes, with minimal additional profiling.
APA, Harvard, Vancouver, ISO, and other styles
31

Colin, Alexei, Emily Ruppel, and Brandon Lucia. "A Reconfigurable Energy Storage Architecture for Energy-harvesting Devices." ACM SIGPLAN Notices 53, no. 2 (November 30, 2018): 767–81. http://dx.doi.org/10.1145/3296957.3173210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tultemirova, G. U., N. T. Momunalieva, and A. J. Akkozov. "COMPUTER MODEL OF HOLOGRAM SYNTHESIS BY THE REAL PHASE." Herald of KSUCTA, №2, Part 1, 2022, no. 2-1-2022 (April 30, 2022): 289–94. http://dx.doi.org/10.35803/1694-5298.2022.2.289-294.

Full text
Abstract:
Computer-synthesized holograms are widely used in areas such as optical information processing, image recognition, three-dimensional display of digital data, and modelling of holographic processes. It is difficult to overestimate the usefulness of the use of synthesized holograms for image reconstruction in acoustic and microwave holography. The use of synthesized holograms as elements of holographic storage devices is promising. Computer synthesis is often the only way to obtain holograms with desired properties. The main advantage of the synthesized hologram is that it is an effective means for converting digital information into optical. Due to this, it is possible to create hybrid-computing systems that are unique in performance, including digital electronic and optical processors and combining the flexibility and versatility of an electronic computer with the enormous performance inherent in an optical processor due to the parallelism of optical information processing. The use of digital holograms as elements in holographic storage devices is promising.
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Zhi-Gao, and Lei Wang. "Recent Progress on Probe-Based Storage Devices." IEEE Access 7 (2019): 79103–17. http://dx.doi.org/10.1109/access.2019.2922644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sebastian, Alycia, and K. Siva Sankar. "A Secure and Reliable Method to Protect USB Data." APTIKOM Journal on Computer Science and Information Technologies 4, no. 2 (July 1, 2019): 57–60. http://dx.doi.org/10.11591/aptikom.j.csit.34.

Full text
Abstract:
With technology advancement people have started using different type of memory devices for storing data and keeping it secure has become concern in today’s world. Universal Serial Bus (USB) flash drives are leading portable storage device for storage and easy transfer of data from one computer to another. The usage of USB has grown exponentially and without security the data on the disk is at risk. Nowadays USB manufacturers offer password protection and fingerprint authentication to secure the USB data. In this paper, USB is devised as a highly secured portable boot medium with fingerprint authentication to secure the data.
APA, Harvard, Vancouver, ISO, and other styles
35

R.Kennady, Et al. "Reliable Techniques for Providing Secure Access Control for Cloud Storage on Mobile Devices." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (March 31, 2023): 354–57. http://dx.doi.org/10.17762/ijritcc.v11i3.9868.

Full text
Abstract:
This research focuses on the development of a credible access control method for mobile device cloud storage. The proposed method involves a six-step process, including user registration and login, key generation, data encryption and upload, authentication theory between mobile devices, and data download and decryption. The method incorporates the use of mobile TPM (Trusted Platform Module) chips to ensure trust chain transmission during key exchange. Additionally, encryption based on elliptic curve cryptography is employed to reduce the key length and facilitate secure key sharing among multiple mobile devices. The proposed method offers enhanced security and reliability compared to conventional data encryption methods provided by cloud storage service providers, with minimal interaction data and increased confidence level. It holds significant practical value and exhibits a wide range of potential applications in the field of cloud storage security technology.
APA, Harvard, Vancouver, ISO, and other styles
36

Hou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.

Full text
Abstract:
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.
APA, Harvard, Vancouver, ISO, and other styles
37

Carvey, Harlan, and Cory Altheide. "Tracking USB storage: Analysis of windows artifacts generated by USB storage devices." Digital Investigation 2, no. 2 (June 2005): 94–100. http://dx.doi.org/10.1016/j.diin.2005.04.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Xu, Luoshengya. "Flash storage technology status and development research." Journal of Physics: Conference Series 2649, no. 1 (November 1, 2023): 012046. http://dx.doi.org/10.1088/1742-6596/2649/1/012046.

Full text
Abstract:
Abstract Data storage devices are an important component of computer systems. Solid-state Drives, which use NAND Flash technology, are widely used in various fields due to their unique advantages such as high read-write speed, low power consumption, shock resistance, and small size compared to traditional mechanical hard drives. This paper first discusses the basic structure and principles of Flash memory, including floating gate transistors for storing and reading charges. Based on the current state of NAND Flash-based solid-state hard drives, this paper discusses key technologies and characteristics such as flash memory types, wear leveling, garbage collection, etc. It explores their features, advantages and limitations, and finally reasonably deduces the future development trend of Flash devices.
APA, Harvard, Vancouver, ISO, and other styles
39

Chum, Sopanhapich, Heekwon Park, and Jongmoo Choi. "Supporting SLA via Adaptive Mapping and Heterogeneous Storage Devices in Ceph." Electronics 10, no. 7 (April 2, 2021): 847. http://dx.doi.org/10.3390/electronics10070847.

Full text
Abstract:
This paper proposes a new resource management scheme that supports SLA (Service-Level Agreement) in a bigdata distributed storage system. Basically, it makes use of two mapping modes, isolated mode and shared mode, in an adaptive manner. In specific, to ensure different QoS (Quality of Service) requirements among clients, it isolates storage devices so that urgent clients are not interfered by normal clients. When there is no urgent client, it switches to the shared mode so that normal clients can access all storage devices, thus achieving full performance. To provide this adaptability effectively, it devises two techniques, called logical cluster and normal inclusion. In addition, this paper explores how to exploit heterogeneous storage devices, HDDs (Hard Disk Drives) and SSDs (Solid State Drives), to support SLA. It examines two use cases and observes that separating data and metadata into different devices gives a positive impact on the performance per cost ratio. Real implementation-based evaluation results show that this proposal can satisfy the requirements of diverse clients and can provide better performance compared with a fixed mapping-based scheme.
APA, Harvard, Vancouver, ISO, and other styles
40

O.Pandithurai, Et al. "Data Persistence Storage in VMs Cloud-Based Software." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (February 25, 2023): 194–97. http://dx.doi.org/10.17762/ijritcc.v11i2.9831.

Full text
Abstract:
The virtual machine data persistence storage method in a cloud environment addresses the challenge of persistent storage for user data in cloud computing systems. This paper proposes a system and method that enables the creation and expansion of block devices for virtual machines. The method involves a major node receiving user requests, determining whether it is a block device creation or expansion request, and executing the appropriate steps. The major node interacts with storage nodes to create logical volumes and register them as block device services. By implementing this method, the issue of non-persistent storage for user data after virtual machine shutdown is effectively resolved. This paper presents a detailed description of the method, its background, research objectives, and a conclusion highlighting the significance and benefits of the proposed virtual machine data persistence storage system.
APA, Harvard, Vancouver, ISO, and other styles
41

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
42

Mutarraf, Muhammad, Yacine Terriche, Kamran Niazi, Juan Vasquez, and Josep Guerrero. "Energy Storage Systems for Shipboard Microgrids—A Review." Energies 11, no. 12 (December 14, 2018): 3492. http://dx.doi.org/10.3390/en11123492.

Full text
Abstract:
In recent years, concerns about severe environmental pollution and fossil fuel consumption has grabbed attention in the transportation industry, particularly in marine vessels. Another key challenge in ships is the fluctuations caused by high dynamic loads. In order to have a higher reliability in shipboard power systems, presently more generators are kept online operating much below their efficient point. Hence, to improve the fuel efficiency of shipboard power systems, the minimum generator operation with N-1 safety can be considered as a simple solution, a tradeoff between fuel economy and reliability. It is based on the fact that the fewer the number of generators that are brought online, the more load is on each generator such that allowing the generators to run on better fuel efficiency region. In all-electric ships, the propulsion and service loads are integrated to a common network in order to attain improved fuel consumption with lesser emissions in contrast to traditional approaches where propulsion and service loads are fed by separate generators. In order to make the shipboard power system more reliable, integration of energy storage system (ESS) is found out to be an effective solution. Energy storage devices, which are currently being used in several applications consist of batteries, ultra-capacitor, flywheel, and fuel cell. Among the batteries, lithium-ion is one of the most used type battery in fully electric zero-emission ferries with the shorter route (around 5 to 10 km). Hybrid energy storage systems (HESSs) are one of the solutions, which can be implemented in high power/energy density applications. In this case, two or more energy storage devices can be hybridized to achieve the benefits from both of them, although it is still a challenge to apply presently such application by a single energy storage device. The aim of this paper is to review several types of energy storage devices that have been extensively used to improve the reliability, fuel consumption, dynamic behavior, and other shortcomings for shipboard power systems. Besides, a summary is conducted to address most of the applied technologies mentioned in the literature with the aim of highlighting the challenges of integrating the ESS in the shipboard microgrids.
APA, Harvard, Vancouver, ISO, and other styles
43

Selvam, S., and S. Thabasu Kannan. "A Proficient Algorithm for Compression and Storage of Two-Tone Image." Asian Journal of Computer Science and Technology 5, no. 1 (May 5, 2016): 36–41. http://dx.doi.org/10.51983/ajcst-2016.5.1.1759.

Full text
Abstract:
Since 1990s , there has be a swift, increase in computers, storage media and digital image taking devices, which enables a large number of digital information and store in computer readable formats. Image compression is an important issue in internet, mobile communication, digital library and other applications. Image compression refers to represent an image with as few bits as possible while preserving the level of quality and intelligibility required for a particular application. The present work aims to develop an efficient algorithm for compression and storage of two-tone image. In this paper, an efficient coding technique is proposed and termed as line- skipping coding for two-tone image. The technique exploits 2-D correlation present in the image. This new algorithm is devised to reduce fifty to seventy five percentage of memory storage.
APA, Harvard, Vancouver, ISO, and other styles
44

Villanueva, Pedro, Sergio Bona, Rubén Lostado-Lorza, and Fernando Veiga. "Morphological Design of a Bicycle Propulsion Component Using the Hierarchical Analysis Process (AHP)." Applied Sciences 13, no. 13 (July 1, 2023): 7792. http://dx.doi.org/10.3390/app13137792.

Full text
Abstract:
There are many mechanical and/or electrical energy storage devices nowadays which can be mounted on standard bicycles. The current trend regarding bicycle energy storage devices is to develop and improve electrical and electronic systems that can ease transportation. However, this paper shows the design process of a purely mechanical energy storage device, with no electrical components, which instead aims to entertain the user, producing a stimulus related to speed and physical exertion. The mechanical device has been designed according to an aspect or fashion known as steampunk, so that the mechanical elements forming the device (springs and spur gears) are visible to the user. The storage and discharge of energy are only produced by the user. In order to charge the device, after reaching an appropriate speed, the user uses the pedals in reverse motion. Alternatively, the mechanism can also be charged with a controlled braking system by actuating on a crank. The design process was based on the total design of Pugh and the AHP and QFD techniques.
APA, Harvard, Vancouver, ISO, and other styles
45

Kirillov, Roman, Radmir Aflyatunov, Petr Vasilyev, and Regina Khazieva. "SIMULATION OF ELECTROMAGNETIC PROCESSES IN THE FILTER-COMPENSATOR DEVICE AS PART OF THE CHARGING SYSTEM OF THE CAPACITIVE STORAGE." Electrical and data processing facilities and systems 19, no. 1 (2023): 82–92. http://dx.doi.org/10.17122/1999-5458-2023-19-1-82-92.

Full text
Abstract:
The relevance Secondary power supplies, frequency converters, and inverters are actively used in modern rapidly developing power engineering. The trend towards a decrease in the weight and size of devices and an increase in their power explains the need to use pulse modes of electrical energy converters. The oscillatory circuits of resonant inverters contain elements such as an inductor and a capacitor, i.e. electromagnetic elements, as a rule, constituting up to 85–90 % of the mass and dimensions of secondary power supplies. The main technical means of reducing the mass and dimensions of electromagnetic elements are increasing the conversion frequency and functional integration. Resonant modes of operation of inverters during switching can reduce interference and losses. Aim of research This article discusses the development of an efficient capacitive storage charging system and simulation of electromagnetic processes in a filtercompensating device as part of an efficient capacitive storage charging system. The main task is to develop an efficient capacitive storage charging system. Research methods Research methods. In this study, the following methods were used: the study of scientific literature and computer simulation in the Matlab environment. Results The authors have developed a computer model in MatLab of a capacitive storage charging system based on a half-bridge circuit of an inductivecapacitive converter. A multifunctional integrated electromagnetic component (MIEC) is used as a pre-absorber. Investigations of voltage levels at various points of the four-terminal network have been carried out. The voltage on the plates and capacitance MIEC was determined. The voltage in the diagonals of the inverter was measured to find the maximum voltage. Because of computer modeling and experimental research, graphs of voltages on the elements of the half-bridge circuit of the capacitive storage charging system were obtained. The developed computer model will allow the investigation of various modes of operation of a secondary power source based on the proposed component in high-voltage charging systems for energy storage devices. The developed model allows you to reduce the financial costs of experimental research. Also, this model allows you to explore more complex systems based on MIEC, which have different properties and indicators.
APA, Harvard, Vancouver, ISO, and other styles
46

Ahsan, Talha, Farrukh Zeeshan khan, Zeshan Iqbal, Muneer Ahmed, Roobaea Alroobaea, Abdullah M. Baqasah, Ihsan Ali, and Muhammad Ahsan Raza. "IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–13. http://dx.doi.org/10.1155/2022/8570064.

Full text
Abstract:
Advancement in technology has led to innovation in equipment, and the number of devices is increasing every day. Industries are introducing new devices every day and predicting 50 billion connected devices by 2022. These devices are deployed through the Internet, called the Internet of Things (IoT). Applications of IoT devices are weather prediction, monitoring surgery in hospitals, identification of animals using biochips, providing tracking connectivity in automobiles, smart home appliances, etc. IoT devices have limitations related to security at both the software and hardware ends. Secure user interfaces can overcome software-level limitations like front-end-user interfaces are accessed easily through public and private networks. The front-end interfaces are connected to the localized storage to contain data produced by the IoT devices. Localized storage deployed in a closed environment connected to IoT devices is more efficient than online servers from a security perspective. Blockchain has emerged as a technology or technique with capabilities to achieve secure administrational authentication and accessibility to IoT devices and their computationally produced data in a decentralized way with high reliability, interrogation, and resilience. In this paper, we propose device, end-user, and transactional authentication techniques using blockchain-embedded algorithms. The localized server interacts with the user interface to authenticate IoT devices, end-users, and their access to IoT devices. The localized server provides efficiency by reducing the load on the IoT devices by carrying out end-user heavy computational data, including end-user, IoT device authentication, and communicational transactions. Authentication data are placed on the public ledger in block form, distributed over the system nodes through blockchain algorithms.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Zhi Chun, Song Wei Li, Wei Ren Wang, Wei Zhang, and Li Jun Qi. "Single Chip Microcomputer Cluster Management." Advanced Materials Research 933 (May 2014): 584–89. http://dx.doi.org/10.4028/www.scientific.net/amr.933.584.

Full text
Abstract:
This paper presents a system in which the cluster devices are controlled by single-chip microcomputers, with emphasis on the cluster management techniques of single-chip microcomputers. Each device in a cluster is controlled by a single-chip microcomputer collecting sample data sent to and driving the device by driving data received from the same cluster management computer through COMs. The cluster management system running on the cluster management computer carries out such control as initial SCM identification, run time slice management, communication resource utilization, fault tolerance and error corrections on single-chip microcomputers. Initial SCM identification is achieved by signal responses between the single-chip microcomputers and the cluster management computer. By using the port priority and the parallelization of serial communications, the systems real-time performance is maximized. The real-time performance can be adjusted and improved by increasing or decreasing COMs and the ports linked to each COM, and the real-time performance can also be raised by configuring more cluster management computers. Fault-tolerant control occurs in the initialization phase and the operational phase. In the initialization phase, the cluster management system incorporates unidentified single-chip microcomputers into the system based on the history information recorded on external storage media. In the operational phase, if an operation error of reading and writing on a single-chip microcomputer reaches a predetermined threshold, the single-chip microcomputer is regarded as serious fault or not existing. The cluster management system maintains accuracy maintenance database on external storage medium to solve nonlinear control of specific devices and accuracy maintenance due to wear. The cluster management system uses object-oriented method to design a unified driving framework in order to enable the implementation of the cluster management system simplified, standardized and easy to transplant. The system has been applied in a large-scale simulation system of 230 single-chip microcomputers, which proves that the system is reliable, real-time and easy to maintain.
APA, Harvard, Vancouver, ISO, and other styles
48

Et.al, Ms Hepisuthar. "Comparative Analysis Study on SSD, HDD, and SSHD." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 3635–41. http://dx.doi.org/10.17762/turcomat.v12i3.1644.

Full text
Abstract:
In the Current Century, permeant storage devices and methods of storing data changed from traditional HDD to SDD. In this document, we discuss the merge of HDD and SSD. The Abbreviation of SSHD is called the solid-state hybrid disk. A mixture of both secondary devices to enhance the performance of the system. Inside the SSD, data movement events occur without any user input. Recent research has suggested that SSD has only the Replacement of secondary storage. HDD is also good in life span with longer life. It’s more reliable for long time data contained in this. HDD storage has typical magnetic fields for store data. SSD contains NAND flash memory to write the data in the drive. Based on the method and material of storing different. HDD and SSD feature well to upgrade with technology in Computer filed. For enhancing computing speed and excellent processing SSHD good to use in computer.Ratio increase of SSHD usage in current laptop and in computer system.
APA, Harvard, Vancouver, ISO, and other styles
49

You, Taehee, Sangwoo Han, Young Min Park, Hyuk-Jun Lee, and Eui-Young Chung. "Multitoken-Based Power Management for NAND Flash Storage Devices." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, no. 10 (October 2020): 2898–910. http://dx.doi.org/10.1109/tcad.2019.2953948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Youhui, Hongyi Wang, Dongsheng Wang, and Weimin Zheng. "Employing Object-Based Storage Devices to Embed File Access Control in Storage." Intelligent Automation & Soft Computing 17, no. 1 (January 2011): 1–11. http://dx.doi.org/10.1080/10798587.2011.10643129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography