NAND Flash memories have rapidly emerged as a storage class memory such as SSD, CF Card, SD Card. Due to its distinct operation mechanisms, NAND Flash memory suffers from erase/program endurance, data retention and pr...
详细信息
The manuscript of mural not only reflected the basic concept of the artist before the complete painting was created, but also revealed painting techniques of different historical periods. They had important significan...
详细信息
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have b...
详细信息
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. To evaluate the discriminating capability of vocabularies automatically constructed from domain and non-domain specific corpus, the concept of discrimination index defined by Cosine similarity and Jicard distance was introduced. To validate the effectiveness of domain-specific vocabulary, a large-scale corpus was built from abstract content in IT security literature retrieved from open literature database and annotated manually by experts. Domain vocabularies of single word-vocabulary and co-occurrence phrase-vocabulary were constructed from positive and negative corpus with TF/IDF-like schema. The paper firstly carried some discussion on soundness of its customized seed keywords submit to do "AND"-mode search by retrieval efficiency analysis, it also presented yearly distribution analysis on the retrieved paper and ranked phrases in different vocabularies. The discrimination index values between these vocabularies show that domain vocabulary is more representative and the experimental result of document classification confirms the effectiveness of domain-specific vocabulary although there is no much difference in performance between single word -vocabulary and bi-lexical co-occurrence domain vocabulary.
NAND Flash memories have rapidly emerged as a storage class memory such as SSD (Solid State Disk), CF (Compact Flash) Card, SD (Secure Digital Memory) Card. Due to its distinct operation mechanisms, NAND Flash memory ...
详细信息
NAND Flash memories have rapidly emerged as a storage class memory such as SSD (Solid State Disk), CF (Compact Flash) Card, SD (Secure Digital Memory) Card. Due to its distinct operation mechanisms, NAND Flash memory suffers from erase/program endurance, data retention and program/read disturbance problems. Specifically, erase and program operation keeps in developing bad blocks during the lifetime of memory chips. Bad blocks are blocks that contain faulty bits but the ECC (Error Correction Code) algorithm cannot correct them. Although wear leveling tries to balance the erase/program operations on different blocks so that all blocks can wear out at a similar pace, new bad blocks still inevitably *** propose an in-field testing technique which takes some pages in a block as predictors. Due to wear out faster than the other pages, the predictors will become bad before the other pages in the block become bad. The further questions are (1) how to detect those wearing fast pages so as to use them as predictors, (2) how many predictors are needed to achieve a satisfactory prediction accuracy, (3) misprediction will result in what negative impact on performance and endurance.
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient mult...
详细信息
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient multiple pattern searching algorithms on multi-core *** observe an important feature which indicates that the multiple pattern matching time mainly depends on the number and minimal length of *** multi-core algorithm proposed in this paper leverages this feature to decompose pattern set so that the parallel execution time is *** formulate the problem as an optimal decomposition and scheduling of a pattern set,then propose a heuristic algorithm,which takes advantage of dynamic programming and greedy algorithmic techniques,to solve the optimization *** results suggest that our decomposition approach can increase the searching speed by more than 200% on a 4-core AMD Barcelona system.
Image Retrieval in Data Stream is becoming very important in recent years with the development of internet and the focus on information security. In Data Stream, image retrieval is different from the traditional image...
详细信息
ISBN:
(纸本)9781457714146
Image Retrieval in Data Stream is becoming very important in recent years with the development of internet and the focus on information security. In Data Stream, image retrieval is different from the traditional image retrieval in that, it requires high efficiency and network adaptive ability, while the traditional image retrieval does not have such hard requirements. In this paper, we propose a novel approach to retrieval image in data stream using Principle Component Analysis (PCA). By subdividing image into several blocks and extracting image principle features, our method can retrieval image very efficiently, this meets the needs of wide band width network traffic. Because the natural character of PCA, our method can be adaptive to the network traffic by simply modify a few parameters by an automatic way. Our experiments show that our approach has high Recall Rate and very low False Positive Rate.
Wireless mesh networks is a new type of broadband access *** has very typical networkarchitecture of hybrid mesh network *** wireless mesh network with distributed networkarchitecture,it is relatively fragile and vu...
详细信息
Wireless mesh networks is a new type of broadband access *** has very typical networkarchitecture of hybrid mesh network *** wireless mesh network with distributed networkarchitecture,it is relatively fragile and vulnerable to *** this paper,we first analyze the characters of hybrid mesh network *** security weaknesses of WMNs mainly reflected in the transmission channel,authentication,physical protection and routing *** the basis of analysis of security defects of WMNs,we design a cross-layer security framework to improve the security of *** last,we interpret some key Technologies in this security Framework.
The guarantee of quality of service(Qo S) is very critical for wireless mesh networksThis paper firstly analyzes the characteristics of Wireless Mesh networksThe related concepts, Qo S routing problems, Qo S routing p...
详细信息
The guarantee of quality of service(Qo S) is very critical for wireless mesh networksThis paper firstly analyzes the characteristics of Wireless Mesh networksThe related concepts, Qo S routing problems, Qo S routing performance metrics, some key solutions to the research situation are summarized and reviewed in this paperWe focus on the classification of routing protocols of wireless mesh network and the strengths and weaknesses of existed routing protocols of wireless mesh networkAt last, the difficulties, key elements and design thoughts were discussed and analyzedThe intelligent optimization methods become the primary method to solve the problem.
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have b...
详细信息
暂无评论