Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
Nowadays, significant attention has been paid to the flash memory-based Solid State Disk (SSD). Different from traditional disks, SSD uses semiconductor chips for storing the data. This structure enjoys original technical characteristics including low power consumption, shock resistance and high per...
| Main Author: | Alsalibi, Ahmed I N |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/45327/ http://eprints.usm.my/45327/1/AHMED%20I.%20N.%20ALSALIBI.pdf |
Similar Items
Minimizing The Garbage Collection Time In Flash Memory Using Efficient Data Allocation Scheme.
by: Rahiman, Amir Rizaan
Published: (2009)
by: Rahiman, Amir Rizaan
Published: (2009)
An Enhanced Memory Address Mapping Scheme for Improved Memory Access Performance of 2-D DWT Processing Systems
by: Lee, Sze-Wei, et al.
Published: (2007)
by: Lee, Sze-Wei, et al.
Published: (2007)
A 1.3-Gsample/s interpolation with flash CMOS ADC based on active interpolation technique
by: Seemi, S., et al.
Published: (2006)
by: Seemi, S., et al.
Published: (2006)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Continuous media (CM) data stream in flash-based solid state disk (SSD) storage server
by: Abdul Rahiman, Amir Rizaan, et al.
Published: (2019)
by: Abdul Rahiman, Amir Rizaan, et al.
Published: (2019)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Data Transfer Management In Grid-Based Mass Storage Environment.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
A fair AQM scheme for aggregated ECN and non-ECN traffic
by: Chong, P
Published: (2004)
by: Chong, P
Published: (2004)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
by: Eessa, Mohammed F.
Published: (2015)
by: Eessa, Mohammed F.
Published: (2015)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
CDS502 - Big Data Storage and Management (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
SLA-driven flexible bandwidth reservation negotiation schemes for QoS aware IP networks
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
CDS502 – Big Data Storage and Management(Storan dan Pengurusan Data Raya) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Enhancing Groupware For Knowledge Management.
by: Cheah, Yu-N
Published: (2007)
by: Cheah, Yu-N
Published: (2007)
Learning Process Enhancement for Robot Behavior
by: Baneamoon, Saeed Mohammed, et al.
Published: (2007)
by: Baneamoon, Saeed Mohammed, et al.
Published: (2007)
Enhancement Of Wifi Indoor Positioning
System
by: Aboodi, Ahed Hussein
Published: (2011)
by: Aboodi, Ahed Hussein
Published: (2011)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Framework To Enhance Veracity And Quality Of Big Data
by: Ridzuan, Fakhitah
Published: (2021)
by: Ridzuan, Fakhitah
Published: (2021)
Enhanced Automated Framework For Cattle Tracking And Classification
by: Williams, Bello Rotimi
Published: (2022)
by: Williams, Bello Rotimi
Published: (2022)
Similar Items
-
Minimizing The Garbage Collection Time In Flash Memory Using Efficient Data Allocation Scheme.
by: Rahiman, Amir Rizaan
Published: (2009) -
An Enhanced Memory Address Mapping Scheme for Improved Memory Access Performance of 2-D DWT Processing Systems
by: Lee, Sze-Wei, et al.
Published: (2007) -
A 1.3-Gsample/s interpolation with flash CMOS ADC based on active interpolation technique
by: Seemi, S., et al.
Published: (2006) -
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)