An Overview of Video Allocation Algorithms for Flash-based SSD Storage Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 3
Abstract
Despite the fact that Solid State Disk (SSD) data storage media had offered a revolutionary property storages community, but the unavailability of a comprehensive allocation strategy in SSDs storage media, leads to consuming the available space, random writing processes, time-consuming reading processes, and system resources consumption. In order to overcome these challenges, an efficient allocation algorithm is a desirable option. In this paper, we had executed an intensive investigation on the SSD-based allocation algorithms that had been proposed by the knowledge community. An explanatory comparison had been made between these algorithms. We reviewed these algorithms in order to building advanced knowledge armature that would help in inventing new allocation algorithms for this type of storage media.
Authors and Affiliations
Jaafer Al-Sabateen , Saleh Ali Alomari , Putra Sumari
Realtime Application of Constrained Predictive Control for Mobile Robot Navigation
This work addresses the implementation issue of constrained Model Predictive Control (MPC) for the autonomous trajectory-tracking problem. The chosen process to control is a Wheeled Mobile Robot (WMR) described by a disc...
Comparative Performance Analysis of Feature(S)-Classifier Combination for Devanagari Optical Character Recognition System
This paper presents a comparative performance analysis of feature(s)-classifier combination for Devanagari optical character recognition system. For performance evaluation, three classifiers namely support vector machine...
A Survey on the Cryptographic Encryption Algorithms
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and...
A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks
Software-Defined Networks have seen an increas-ing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issu...
MINING POSITIVE AND NEGATIVE ASSOCIATION RULES USING FII-TREE
Positive and negative association rules are important to find useful information hidden in large datasets, especially negative association rules can reflect mutually exclusive correlation among items. Association rule mi...