scholarly journals Optimization models for computer data storage design: An application

1994 ◽  
Vol 26 (4) ◽  
pp. 743-756
Author(s):  
Marco Gagliardi ◽  
Cosimo Spera
2021 ◽  
Vol 2066 (1) ◽  
pp. 012022
Author(s):  
Cheng Luo

Abstract Due to the continuous development of information technology, data has increasingly become the core of the daily operation of enterprises and institutions, the main basis for decision-making development. At the same time, due to the development of network, the storage and management of computer data has attracted more and more attention. Aiming at the common problems of computer data storage and management in practical work, this paper analyzes the object and content of data management, investigates the situation of computer data storage and management in China in recent two years, and interviews and tests the data of programming in this design platform. At the same time, in view of the related problems, the research results are applied to practice. On the basis of big data, the storage and management platform is designed. The research and design adopts a special B+ tree node linear structure of CIRC tree, and the linear node structure is changed into a ring structure, which greatly reduces the number of data persistence instructions and the performance overhead. The results show that compared with the most advanced B+ tree design for nonvolatile memory, crab tree has 3.1 times and 2.5 times performance improvement in reading and writing, respectively. Compared with the previous NV tree designed for nonvolatile memory, it has a performance improvement of 1.5 times, and a performance improvement of 8.4 times compared with the latest fast-fair. In the later stage, the expansion of the platform functions is conducive to the analysis and construction of data related storage and management functions, and further improve the ability of data management.


1988 ◽  
Vol 110 (4) ◽  
pp. 507-514 ◽  
Author(s):  
S. K. Sinha

Thin spinning annular disks, which have widely varying applications ranging from inertial wheels in spacecraft to computer data storage devices, experience some inherent vibration problems during operation. One of the techniques to control the vibrations of the disk, being analyzed in this paper, is to stiffen it by attaching a reinforcing ring at its outer edge. The present work considers the effect of adding such a ring and discusses the changes in the natural frequencies for a large range of design parameters. The classical plate bending equation based upon small deflection theory which includes the contribution of rotational membrane stresses has been used in the eigenvalue formulation. Numerical results presented in a nondimensional form should be useful in predicting the dynamic response of such a disk stiffened with a circular ring under the spinning conditions.


1981 ◽  
Vol 12 (2) ◽  
pp. 99-101
Author(s):  
D.J. Cairns ◽  
J.J. Florentin

Author(s):  
Arathi Navaneeth ◽  
Vignesh P P ◽  
Sreehari N R ◽  
K. Pramilarani

Wireless Data communication is fastest growing technology era in which the research society has recently embarked. Today, Computer data can include financial transactions such as electronic payments, M- wallets and sensitive multimedia contents. The explosive volumes of computer devices personal data, bring-up more attention to securely data storage rather than consideration on data privacy and confidentiality levels. In this scenario Air Gap Data Communication, Machine Leaning (ML) and image processing brings an important role in the electronic data management. It is always expensive and hard to manage the data manually without adopting machine learning and image processing techniques using metadata. The contribution of this research article is to demonstrate a securing computer data storage secrecy and privacy in cloud communication framework in terms of automatic data classification using computer training datasets with help of Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category afterwards by applying various existing cryptographic solutions to assuring data privacy, confidentiality levels and alerting the use of abusive contents and simulation results demonstrates that reducing the overall cost. Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category.


Sign in / Sign up

Export Citation Format

Share Document