Дисертації з теми "Coded data storage"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-27 дисертацій для дослідження на тему "Coded data storage".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Licona-Nunez, Jorge Estuardo. "M-ary Runlength Limited Coding and Signal Processing for Optical Data Storage." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5195.
Повний текст джерелаBothin, Anton. "A Model for Company Document Digitization (CODED) : Proposal for a Process Model for Digitizing Company Documents." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292785.
Повний текст джерелаDet är många företag som vill gå mot att digitalisera sitt arbetsflöde. Många av dessa företag har däremot en avsaknad av den tekniska expertis som krävs. För att assistera företag i detta skulle en processmodell kunna användas som ett redskap för framgångsrik dokumentdigitalisering. Problemet är att det just nu inte existerar någon sådan processmodell för dokumentdigitalisering. Syftet med denna avhandling är att föreslå en processmodell för digitalisering. Målet är att hjälpa företag i att digitalisera både deras dokument och deras arbetsflöde. Hur en sådan processmodell skulle kunna struktureras är denna rapports forskningsfråga. Det fanns ingen existerande modell att utgå ifrån. Därför användes andra modeller inom området för programvaruteknik som en bas under forskningen. Forskningen var kvantitative och explorativ, och den använde designvetenskap som ett forskningsparadigm. En omfattande litteraturstudie genomfördes innan utvecklingen av processmodellen påbörjades. Modellen evaluerades utifrån intervjuer tillsammans med aktionsforskning. Där intervjuerna har fokuserat på att evaluera modellen utifrån fem kriterier: (1) trovärdighet, (2) semantisk korrekthet, (3) syntaktisk korrekthet, (4) användbarhet, och (5) flexibilitet. Resultatet av denna avhandling är ett förslag till en processmodell för att digitalisera dokument, vid namnet CODED (company document digitization process model). Den föreslagna modellen har baserat både på information som samlats från litteraturstudien, och information från intervjuerna. Litteraturstudien visade att processmodellen är unik, då det ej existerade någon likartad modell tidigare. Intervjuerna visade att modellen är valid, då den uppfyllde de definierade evalueringskriterierna.
Ali, Muhammad. "Stockage de données codées et allocation de tâches pour les centres de données à faible consommation d'énergie." Electronic Thesis or Diss., CY Cergy Paris Université, 2023. http://www.theses.fr/2023CYUN1243.
Повний текст джерелаData centers are responsible for a significant portion of global energy consumption. This consumption is expected to grow in the coming years, driven by the increasing demand for data center services. Therefore, the need for energy-efficient, low-carbon data center operations is growing rapidly.This research focuses on designing and implementing a low-carbon, energy-efficient data center powered by solar and hydrogen, granting it independence from the power grid. As a result, the data center is limited by the upper bound on the energy consumption, which is 10KWh. The maximum usage of energy-constraint imposes several challenges to the design, energy usage, and sustainability of the data center.The work first contributes to designing a low-power budget data center while respecting the overall energy constraint. We tried to save the energy usage of the data center through the right choice of hardware while keeping the performance of the data center intact. The second contribution of our work provides valuable protocols like lazy repair in distributed data storage, job placement, and power management techniques to further reduce the data center's energy usage. With the combined efforts of the right choice of hardware, protocols, and techniques, we significantly reduced the overall energy consumption of the data center
Argon, Cenk. "Turbo product codes for optical communications and data storage." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15350.
Повний текст джерелаYang, Sizhen Michael. "Construction of low-density parity-check codes for data storage and transmission." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/280665.
Повний текст джерелаTakashima, Yuzuru, Guanghao Chen, and Bo E. Miller. "Eigenmode multiplexing with SLM for volume holographic data storage." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626290.
Повний текст джерелаChang, Cheng. "Reliable and secure storage with erasure codes for OpenStack Swift in PyECLib." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202972.
Повний текст джерелаMolnlagring system har upplevt en snabb tillväxt att spela en viktig roll i molnbaserade tjänster under det senaste decenniet. Bland annat är Openstack Swift en programvara med öppen källköd som ska införa som object lagring system. Dessutom har molnlagring system gjort stora ansträngar för att säkerställa kvaliten av sina tjänster. En av de viktigaste faktorerna av molnlagring system är datashållbarheten. Feltoleransmekanismer spelar en viktig roll för att grantera datastillgångår. Bland annat finns det Replikering och RAID används för att skydda data från förlorade trots att de drabbas av många nackdelar. Erasure kodning kommer som nytt koncept som kan tillämpas i lagringssystem för angelägenheten av datastillgänglighet. Forskningar har visat att det kan ge feltolerans med uppsägningar och samtidigt minska kapaciteten och erbjuder en kompromiss mellan prestanda och kostnad. Projekten gjorde en fördjupad undersökning på Openstack Swift och erasure kodning. Analyserna på raderingskodade och replikationssystem har vidtagits för att jämföra egenskaperna hos båda metoder. En prototyp av anpassade radering koden är att implementeras som förlängning till Swift och erbjuder datalagring med lovande tillförlitlighet och prestanda.
Gastón, Brasó Bernat. "Coding techniques for distributed storage." Doctoral thesis, Universitat Autònoma de Barcelona, 2013. http://hdl.handle.net/10803/129277.
Повний текст джерелаOnline data storage is often regarded as a growing business, yet many unresolved issues linger in this specific field and prevent researchers from driving it to full capacity. Data replication (most commonly known as backup) is simply not efficient when improving persistence and accessibility of such data. Error correcting codes are known for their efficiency when adding redundancy to avoid lose of information. Unfortunately, the use of error correcting codes entail additional problems such as the repair problem: how do we replace a storage node downloading as less data as possible from other nodes. In this dissertation, we deepen on state-of-the-art of codes applied to distributed storage systems. Additionally, a family of regenerative codes which we call quasi-cyclic flexible regenerating codes is provided. Quasi-cyclic flexible minimum storage regenerating (QCFMSR) codes are constructed and their existence is well-proven. Quasi-cyclic flexible regenerating codes with minimum bandwidth constructed from a base QCFMSR code are also provided. Quasi-cyclic flexible regenerating codes are very interesting because of their simplicity and low complexity. They allow exact repair-by-transfer in the minimum bandwidth case and an exact pseudo repair-by-transfer in the MSR case, where operations are needed only when a new node enters into the system replacing a lost one. Finally, we propose a new model whereby storage nodes are placed in two racks. This unprecedented two-rack model is generalized to any number of racks. In this specific set-up, storage nodes have different repair costs depending on the rack where they are placed. A threshold function, which minimizes the amount of stored data per node and bandwidth needed to regenerate a failed node, is also shown. This latter threshold function generalizes those given by previous distributed storage models. Tradeoff curves obtained from this threshold function are compared with those obtained from previous models, and it is shown that this new model outperforms previous ones in terms of repair cost.
Harvey, Brett D. "A code of practice for practitioners in private healthcare: a privacy perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/521.
Повний текст джерелаJafarizadeh, Saber. "Distributed coding and algorithm optimization for large-scale networked systems." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13238.
Повний текст джерелаTinnefeld, Christian [Verfasser], and Hasso [Akademischer Betreuer] Plattner. "Building a columnar database on shared main memory-based storage : database operator placement in a shared main memory-based storage system that supports data access and code execution / Christian Tinnefeld ; Betreuer: Hasso Plattner." Potsdam : Universität Potsdam, 2014. http://d-nb.info/1218398442/34.
Повний текст джерелаPaul, Arnab. "Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6848.
Повний текст джерелаMészáros, István. "Distributed P2P Data Backup System." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236378.
Повний текст джерелаSudhindaran, Daniel Sushil. "Generating a Normalized Database Using Class Normalization." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/727.
Повний текст джерела"Practical data integrity protection in network-coded cloud storage." 2012. http://library.cuhk.edu.hk/record=b5549172.
Повний текст джерелаTo protect outsourced data in cloud storage against corruptions, enabling integrity protection, fault tolerance, and efficient recovery for cloud storage becomes critical. To enable fault tolerance from a client-side perspective, users can encode their data with an erasure code and stripe the encoded data across different cloud storage nodes. We base our work on regenerating codes, a recently proposed type of erasure code that borrows the concept of network coding and requires less repair traffic than traditional erasure codes during failure recovery. We study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting. Specifically, we design a practical data integrity protection (DIP) scheme for a specific regenerating code, while preserving the intrinsic properties of fault tolerance and repair traffic saving. Our DIP scheme is designed under the Byzantine adversarial model, and enables a client to feasibly verify the integrity of random subsets of outsourced data against general or malicious corruptions. It works under the simple assumption of thin-cloud storage and allows different parameters to be fine-tuned for the performance-security trade-off. We implement and evaluate the overhead of our DIP scheme in a cloud storage testbed under different parameter choices. We demonstrate that remote integrity checking can be feasibly integrated into regenerating codes in practical deployment.
Detailed summary in vernacular field only.
Chen, Chuk Hin Henry.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2012.
Includes bibliographical references (leaves 38-41).
Abstracts also in Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Preliminaries --- p.4
Chapter 2.1 --- FMSR Implementation --- p.4
Chapter 2.2 --- Threat Model --- p.6
Chapter 2.3 --- Cryptographic Primitives --- p.7
Chapter 3 --- Design --- p.8
Chapter 3.1 --- Design Goals --- p.8
Chapter 3.2 --- Notation --- p.9
Chapter 3.3 --- Overview of FMSR-DIP --- p.11
Chapter 3.4 --- Basic Operations --- p.11
Chapter 3.4.1 --- Upload operation --- p.11
Chapter 3.4.2 --- Check operation --- p.13
Chapter 3.4.3 --- Download operation --- p.15
Chapter 3.4.4 --- Repair operation --- p.16
Chapter 4 --- Implementation --- p.17
Chapter 4.1 --- Integration of DIP into NCCloud --- p.17
Chapter 4.2 --- Instantiating Cryptographic Primitives --- p.18
Chapter 4.3 --- Trade-off Parameters --- p.19
Chapter 5 --- Security Analysis --- p.22
Chapter 5.1 --- Uses of Security Primitives --- p.22
Chapter 5.2 --- Security Guarantees --- p.23
Chapter 5.2.1 --- Corrupting an AECC Stripe --- p.23
Chapter 5.2.2 --- Picking Corrupted Bytes for Checking --- p.25
Chapter 5.2.3 --- Putting It All Together --- p.26
Chapter 6 --- Evaluations --- p.27
Chapter 6.1 --- Running Time Analysis --- p.27
Chapter 6.2 --- Monetary Cost Analysis --- p.30
Chapter 6.3 --- Summary --- p.33
Chapter 7 --- Related Work --- p.34
Chapter 8 --- Conclusions --- p.37
Bibliography --- p.38
Liao, Chen-Hung, and 廖振宏. "A Link Eavesdropping Prevention Problem in Distributed Network Coded Data Storage Systems." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/93535746974018799557.
Повний текст джерела國立交通大學
資訊科學與工程研究所
101
In recent years, network coding plays a key role in distributed storage systems, because of high reliability, security, and low storage cost. However, network coding-based distributed storage systems face an eavesdropping problem when transmitting the repairing data from remote datacenters. This problem is especially crucial in distributed network coded storage systems because more repair bandwidth and repair links are required, compared to conventional replication. In this thesis, we propose an optimization approach to compute the minimum storage according to the required security level. Our numerical results demonstrate that there exists an optimal tradeoff between remote repair bandwidth and storage cost. Moreover, we analyze the relation between security level requirement and the number of remote and local storage nodes, storage cost, data reliability, and secrecy capacity.
Moorthy, Prakash Narayana. "Codes With Locality For Distributed Data Storage." Thesis, 2015. https://etd.iisc.ac.in/handle/2005/2648.
Повний текст джерелаMoorthy, Prakash Narayana. "Codes With Locality For Distributed Data Storage." Thesis, 2015. http://hdl.handle.net/2005/2648.
Повний текст джерелаAl-Awami, Louai. "Distributed Data Storage System for Data Survivability in Wireless Sensor Networks." Thesis, 2013. http://hdl.handle.net/1974/8403.
Повний текст джерелаThesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2013-09-30 22:43:04.509
Papailiopoulos, Dimitrios. "Distributed large-scale data storage and processing." Thesis, 2014. http://hdl.handle.net/2152/29145.
Повний текст джерелаtext
Balaji, S. B. "Erasure Codes for Distributed Storage: Tight Bounds and Matching Constructions." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5330.
Повний текст джерелаLiu, Pi-Hai, and 劉碧海. "DC-Free Signaling for Data Storage Systems:Modulation Codes and Equalization." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/29639104178865737227.
Повний текст джерела國立中央大學
電機工程學系
86
Some data storage systems use AC-coupling devices which can not convey DC signals. DC-free input signals are required by such a channel. There are two methods to generate DC-free signals to satisfy channel requirements: one is charge constrained modulation codes; the other one is combining (d,k) codes and equalization. In this dissertation, these two methods are investigated. Charge constrained modulations codes discussed in our works includes (1) (d,k;C) codes for peak detection channels (2) (0,G/I;C) codes for partial response channels (3) (d,k;C,n) codes for multitrack recording systems. Schneider equalizers add adequate pulses in recording signal to achieve DC-free. This method is applied on a magnetic recording systems to achieve higher recording density.
Mondal, Arijit. "Efficient Hardware Architectures for Error Correcting Codes Applicable to Data Storage." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5674.
Повний текст джерелаHsieh, Cheng-Han, and 謝承翰. "Data Placement Optimization of Erasure Code-based Multi-Cloud Storage." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/h34g6z.
Повний текст джерела國立清華大學
資訊工程學系所
105
The cloud storage system has been popular recently due to the higher and higher demand of storage space. The cloud providers offer large but cheap storage service. People or companies use them and do not have to pay on hardware or electric utility. Companies can use these features to build its own storage service for benefit too. For cloud storage, erasure code can be used to improve data availability and have potential to reduce download time. Erasure code encode files into chunks and place them in different storage regions for higher availability. Besides, these chunks is smaller than the origin file that the download time can be reduced by using parallel downloading. These chunks can also improve the availability by placed at different regions for avoiding regions failure. However, each region owns different request cost, storage cost or even latency and bandwidth. Besides, users location can largely influence download latency and access cost. With these multiple issues, the main point is how to choose the candidate regions for chunks that can fulfill all requirements. In the past, most thesiss focus on specific features. However, the models from those research are not realistic enough. There are many aspects that we need to take into consideration for being closer to the real world. In this thesis, we propose the method with using erasure code and linear programming to include multiple requirements at the same time and find the best placement strategy. The experiment shows that our work can save money at most 66\% and have at most 50\% performance improvement.
Luo, Jeff Yucong. "Secure Cloud Storage." Thesis, 2014. http://hdl.handle.net/10012/8509.
Повний текст джерелаHuang, Bo-Chi, and 黃柏齊. "Increase of Storage Capacity for Holographic Data Storage by Lateral Shearing Interferometry with use of Sparse Code." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/2wkj8n.
Повний текст джерела國立中央大學
光電科學與工程學系
106
In this thesis, an optical model considering the density of signal is proposed based on lateral shearing interferometry with use of sparse code through LPF. This model is applied to the conjugate of record side in holographic data storage system for analyzing the record point of the holographic disk. With this optical model, the shearing image in different signal density, modulation mode, filter size can be predicted. In simulation and experiment, the increase of storage capacity is at least 1.368 times by the limitation of twice.
Nguyen, Phong Sy. "Advanced Coding Techniques with Applications to Storage Systems." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11119.
Повний текст джерела