scholarly journals Research Method of Data Deduplication Backup System

In this paper, we've got studied cutting-edge-day backup systems and used a singular technique which facilitates in decreasing the fragmentation trouble. The winning backup tool have lumps of every backup which is probably bodily scattered, which ends up in a very demanding fragmentation trouble. Fragmentation offers upward thrust to 2 kinds of fragmented containers which is probably sparse and out-of-order boxes. Sparse container exacerbates the device simple ordinary overall performance on both restore and rubbish series. Out-of-order packing containers talk to the ones containers which can be accessed commonly at some point of a repair. As a way to lessen the fragmentation trouble we use the antiquity acquainted set of guidelines and stockpile aware filter out. Those help in figuring out the sparse further to the out of order discipline.

Author(s):  
Carlos Eduardo Sanches da Silva

The process of product development strengthens as a reason for competitiveness, using sundry optimisation methods, e.g. Design for Manufacturing and Assembly (DFMA). Simulating allows engineers or managers to obtain a systemic perspective of how local changes will affect the overall performance over the entire production system, obtaining thus its optimisation. In this study, we aimed at assessing both how DFMA can be integrated with computer simulation and the benefits from the alternatives identified by such method during production and assembly. Using as object of study the electronic voting machine printer, we identified options to improve design from principles of DFMA. The benefits are: reduction in assembly time and costs. As research method we used simulation, in which data were obtained by using direct observations, document analysis, and interviews with incumbents and users. Five models were composed to represent the current assembly process and two future models before applying amendments proposed by DFMA. The results show how effective the integration is with the DFMA simulation.


Author(s):  
Sharon Stopforth

The following paper attempts to find an approach to research that will best suit women who have recovered from addictions and trauma and consider themselves resilient. This approach will need to combine contemporary feminist theory, somatic theory, and alternative forms of representation/interpretation. The paper will begin by exploring the connection between postmodern feminist theory and somatic theory and what they both have to say about how we embody social conditions of gender through non-verbal interactions. Research will then be examined that captures the non-verbal aspects of being in the world and how this intersects with the postmodern turn. Finally, in combining postmodernism, embodiment, and alternative forms of representation, cutting edge research will be explored that takes embodiment to the next level: social action.


2017 ◽  
Vol 12 (12) ◽  
pp. 204
Author(s):  
Benjamin Agyeman ◽  
James Bonn ◽  
Collins Osei

Prior to 1992, Kaplan and Norton posited that organizations solely rely on financial measures to manage their performance. It has become possible for organizations to incorporate in addition to financial measures non- financial measures to manage their performance. It is in this light that balanced scorecard is one of the tools used to manage performance. However, managing the overall performance of organizations using balanced scorecard is limited in literature in Ghanaian banks. This study explores the extent of use of the four perspectives of balanced scorecard as a tool to for managing performance in selected Ghanaian banks. Survey research method was employed. In relation to the extent of used of balanced scorecard perspectives by selected Ghanaian banks to manage performance, it was found that financial perspective was used followed by customer perspective, learning and growth perspective, and internal business process. The ANOVA test showed that the mean scores of the four perspectives of the balanced scorecard was statistically and significantly different from each other. The research concludes that, Ghanaian banks relied heavily on financial perspective to measure performance.


2021 ◽  
Vol 10 (1) ◽  
pp. 45
Author(s):  
Husam Alfahl ◽  
Sami Aldejwi

The COVID-19 pandemic has been affecting all aspects of our lives. In the education sector, the effects of the pandemic have meant that health protective protocols have had to be applied, which in turn has meant that students in many countries are having to complete their studies online. This transition from the traditional mode of education to an online one is the focus of this paper, which compares the two modes. The data were collected from the results of students on courses at Taibah University during 2019 and 2020. The collected data were analyzed to discover whether there was a difference in the students' performance between the two modes of learning, and this was done by applying a quantitative research method. The results showed that there was a significant difference between the two modes in terms of the students’ overall performance.


Author(s):  
Chika George Igwesi ◽  
Agwu Kalu Ukairo ◽  
Mathew Chiedu Ijeh

The study investigated the effect of cognitive crafting on the graduation rate of students in Federal Universities, South East, Nigeria. The study is anchored on Elgar’s Performance Theory of organizations. The survey research method was adopted for the study, making use of structured questionnaire as instruments for data collection. Data were collected from both primary and secondary sources. Hypotheses were tested using the simple linear regression. The study found that cognitive crafting had significant positive effect on the graduation rate of students in Federal Universities, South East, Nigeria (r 0.803; P < 0.05). It was therefore, concluded that cognitive capabilities which promote students’ graduation rate enhances the overall performance of Universities in South East, Nigeria. The study recommended that Universities should be properly funded to encourage the employment and retention of professionals with cognitive capabilities that would enhance students’ graduation rate and overall performance of the Universities. JEL: B10; A02; C06 <p> </p><p><strong> Article visualizations:</strong></p><p><img src="/-counters-/edu_01/0770/a.php" alt="Hit counter" /></p>


2021 ◽  
Vol 17 (4) ◽  
pp. 1-23
Author(s):  
Datong Zhang ◽  
Yuhui Deng ◽  
Yi Zhou ◽  
Yifeng Zhu ◽  
Xiao Qin

Data deduplication techniques construct an index consisting of fingerprint entries to identify and eliminate duplicated copies of repeating data. The bottleneck of disk-based index lookup and data fragmentation caused by eliminating duplicated chunks are two challenging issues in data deduplication. Deduplication-based backup systems generally employ containers storing contiguous chunks together with their fingerprints to preserve data locality for alleviating the two issues, which is still inadequate. To address these two issues, we propose a container utilization based hot fingerprint entry distilling strategy to improve the performance of deduplication-based backup systems. We divide the index into three parts: hot fingerprint entries, fragmented fingerprint entries, and useless fingerprint entries. A container with utilization smaller than a given threshold is called a sparse container . Fingerprint entries that point to non-sparse containers are hot fingerprint entries. For the remaining fingerprint entries, if a fingerprint entry matches any fingerprint of forthcoming backup chunks, it is classified as a fragmented fingerprint entry. Otherwise, it is classified as a useless fingerprint entry. We observe that hot fingerprint entries account for a small part of the index, whereas the remaining fingerprint entries account for the majority of the index. This intriguing observation inspires us to develop a hot fingerprint entry distilling approach named HID . HID segregates useless fingerprint entries from the index to improve memory utilization and bypass disk accesses. In addition, HID separates fragmented fingerprint entries to make a deduplication-based backup system directly rewrite fragmented chunks, thereby alleviating adverse fragmentation. Moreover, HID introduces a feature to treat fragmented chunks as unique chunks. This feature compensates for the shortcoming that a Bloom filter cannot directly identify certain duplicated chunks (i.e., the fragmented chunks). To take full advantage of the preceding feature, we propose an evolved HID strategy called EHID . EHID incorporates a Bloom filter, to which only hot fingerprints are mapped. In doing so, EHID exhibits two salient features: (i) EHID avoids disk accesses to identify unique chunks and the fragmented chunks; (ii) EHID slashes the false positive rate of the integrated Bloom filter. These salient features push EHID into the high-efficiency mode. Our experimental results show our approach reduces the average memory overhead of the index by 34.11% and 25.13% when using the Linux dataset and the FSL dataset, respectively. Furthermore, compared with the state-of-the-art method HAR, EHID boosts the average backup throughput by up to a factor of 2.25 with the Linux dataset, and EHID reduces the average disk I/O traffic by up to 66.21% when it comes to the FSL dataset. EHID also marginally improves the system's restore performance.


2016 ◽  
Vol 29 (4) ◽  
pp. 204
Author(s):  
Mujib Mujib ◽  
Denok Kurniasih ◽  
Ali Rokhman

Officer's performance in Regional Disaster Relief Agency (Badan Penanggulangan Bencana Daerah) Kebumen Regency, based on the existing data in the field, is not yet optimum. This circumstance was related to threefactors namely ability, working discipline, and spiritual motivation. This research aimed to analyze the influence of ability, working discipline, and spiritual motivation toward officers performance in BPBD of Kebumen Regency. The research method used was quantitative analysis, the data obtained by givingquestionnaire, answers were analyzed by multiple linier regression to determine the relations between independent variables: the ability, working discipline, and spiritual motivation with the dependent variable wasperformance. After analyzing three variables, it was found that performance of Civil Servant on Regional Disaster Management Agency Kebumen was good. The result showed that the ability (X1) influenced performance of Civil Servant on Regional Disaster Management Agency Kebumen with percentage of 37.7%;working discipline (X2) influenced performance of Civil Servant on Regional Disaster Management Agency Kebumen with percentage of 72.3%; spiritual motivation infuenced performance of Civil Servant on Regional Disaster Management Agency Kebumen up to 66.1%. The result also showed positive relations between three variables, as those variables were impactful in significant way. Finally; ability, working discipline and spiritual motivation influenced overall performance of Civil Servant on Regional Disaster Management Agency Kebumen up to 78.3%. It means that the greater level of ability, working discipline and spiritual motivation resulted to a greater level performance of Civil Servant on Regional Disaster Management Agency Kebumen, and vice versa.


In cloud storage solutions, deduplication era is often accustomed reduce down the location and facts motion goals of offerings with the beneficial resource of the use of casting off repetitive records and moreover storing truly one replica of them. Deduplication is only even as severa clients' supply non-forestall information to the cloud storage; no matter the truth that, it's going to growth issues regarding safety and protection and assets. Evidence of- assets plans allow any form of owner of non-save you information to steer the cloud garage vicinity internet server that he possesses the records ultimately of a sturdy technique. However, severa purchaser's area tool probably to inscribe their facts preceding to outsourcing them to the cloud storage to preserve non-public privateness, however this obstructs deduplication due to the randomisation assets of coding. Recently, numerous deduplication plans are alleged to solve this disadvantage with the resource of the use of permitting every proprietor to percent ordinary coding trick for normal data. However, quite a few the structures be suffering from way of protection problems, at the same time as you take into account that they may be doing no longer take into account the colourful adjustments in the possession of outsourced information that take region ofttimes within the route of an much less expensive cloud storage issuer. For the length of this paper, we have a propensity to advocate a very one-of-a-kind server-trouble deduplication motif for encrypted facts. It lets in the cloud server to govern accessibility to reduced in size out data at the identical time as soon due to the fact the ownership changes dynamically through using exploiting uneven centered coding similarly to relaxed assets cluster important movement. This prevents information discharge not in reality torevokedusers albeit they antecedently had that facts, but in addition to Connect in Nursing honesthowever-curious cloud storage location internet server. Furthermore, the organized trouble count number warranties information honesty in opposition to any shape of tag incongruity assault. Therefore, protection and protection is advanced in the organized motif. The overall performance evaluation effects show display display that the scheduled style is shape of as low-price due to the reality the preceding systems, while the brought remedy fees is minimal.


2021 ◽  
Vol 10 (4, special issue) ◽  
pp. 190-192
Author(s):  
Keith Harman

Volume 10, issue 4 (special issue) of the Journal of Governance and Regulation is a special issue and as usual it is replete with cutting-edge research studies covering a wide array of important topics dealing with corporate governance and regulation. The special issue therefore reflects this statement from the editorial note policy of the Journal of Governance and Regulation, “providing a continuous development that enables our readers to outline the new and most challenging issues of research in corporate governance and related topics”.


Author(s):  
J. Temple Black

The output of the ultramicrotomy process with its high strain levels is dependent upon the input, ie., the nature of the material being machined. Apart from the geometrical constraints offered by the rake and clearance faces of the tool, each material is free to deform in whatever manner necessary to satisfy its material structure and interatomic constraints. Noncrystalline materials appear to survive the process undamaged when observed in the TEM. As has been demonstrated however microtomed plastics do in fact suffer damage to the top and bottom surfaces of the section regardless of the sharpness of the cutting edge or the tool material. The energy required to seperate the section from the block is not easily propogated through the section because the material is amorphous in nature and has no preferred crystalline planes upon which defects can move large distances to relieve the applied stress. Thus, the cutting stresses are supported elastically in the internal or bulk and plastically in the surfaces. The elastic strain can be recovered while the plastic strain is not reversible and will remain in the section after cutting is complete.


Sign in / Sign up

Export Citation Format

Share Document