Special Feature: system's slowest response time (0.24 sec) with the quickest manual response time, the system is at least 130 times
|
|
- Sybil Hubbard
- 8 years ago
- Views:
Transcription
1 Special Feature: An Automated Chinese Telephone Directory Y. H. Chin, J. W. Jou, W. H. Peng, and C. C. Yang Telecommunication Laboratories of Taiwan Introduction A real-time, on-line information storage and retrieval system for telephone information service has been designed at the Telecommunication Laboratories of Taiwan. The input and output of the system are processed in Chinese via a keyboard and a graphic display unit respectively. System functions include sorting, merging, updating, displaying, and printing of data. In order to avoid a serial, exhaustive search, the file is subdivided into blocks of length x. The optimal size of each block is determined so as to minimize the average number of comparisons (file accesses) to locate a record. The system has been tested on a telephone office of medium capacity-about 8000 subscribers. The number of daily queries is about 1600 and the updating rate is approximately 50. On the basis of a comparison of the May 1975 system's slowest response time (0.24 sec) with the quickest manual response time, the system is at least 130 times faster. The design philosophy stresses fast responses to queries and quick updating of the data. For a computer, a Chinese character is not a character but a pattern; therefore, a portion of the coding is related to Chinese. System Description The system hardware (see Figure 1) consists of an HP/2100A computer under the control of the Moving-Head Disk Operating System (DOS-III). Two secondary storage devices are attached: a moving head disk unit and a magnetic tape unit. The disk unit is used to store the system programs, utility programs, and data files. The data 49
2 PHONETIC SYMBOL KEYBOARD GRAPHIC DISPLAY TAPE READER ELECTROSTATIC PRINTER ~~~~~~~~~~~MAGNETIC DISK TAPE Figure 1. System Block Diagram of the Automatic Telephone Directory Inquiry Services System KEY TABLE key record number TELEPHONE DIRECTORY F ILE record 1 record CHINESE CHARACTER PATTERN FILE (dot matrix) record 1 record m record k Displaying (a) Data Base Structure and Searching Sequence of Telephone Directory Data Base LI user's name 16 s Tel. No. I pointer I 3 s 2 s (b) Record Format for Telephone Directory File I Figure 2. Logical Structure of Data Base files contain the telephone directory file and the Chinese consonants and 16 vowels. The phonetic spellings are character pattern file. The magnetic tape is used as a translated into a string of numerical codes which is used as backup unit. The addresses of the telephone subscribers are a search key to locate the desired record and to display it in stored on the tape for printing of the telephone book.* Chinese. Input devices consist of a paper tape reader, used as a main input device for reading utility programs and data *In general, an operator finds a user's phone number whenever a, keyboard, Muser's name is given in a query. Therefore, the operator at the X which is used to type thephonet icsym spellingseof the service center has no need to find a phone number through a home i t which is used to type the phonetic spellings of the input address of a particular subscriber. In fact, the subscriber's address Chinese characters,4 contains 37 phonetic symbols-21 is confidential at the Query Service Center. 50 COMPUTER
3 Output devices include an HP/1331C X-Y graphic display, which is used to display the desired telephone record in Chinese, and an electrostatic printer (a VERSATEC plotter) for printing the telephone book in Chinese. The speed is about two lines/sec in Chinese characters. Depending on the size of the printed Chinese character, each line can contain 40 to 80 Chinese characters. Except the DOS-III system program, we developed our own utility programs for handling data processing. The functions of these programs are searching, sorting, merging, converting, updating, displaying, printing, and plotting. Data Base Structure In this system we have two data bases: a telephone directory data base and a Chinese character pattern data base. The telephone directory data base is a three-level indexed sequential file containing three files: (1) index table, (2) key table, and (3) telephone directory file (Figure 2a). The record format of the key table has 6 bytes for the search key, 2 bytes for the corresponding record number in the telephone directory file, and 2 bytes for a pointer used for updating. The variable-length record format of the telephone directory file (Figure 2b) consists of three fixed-length fields: a 32-byte name field, which is a variable-length field containing 1 to 16 Chinese character codes, a 6-byte telephone number field, and a 4-byte pointer field for printing the telephone- book. Since each sector (256 bytes) can store six 42-byte records, it is very easy to calculate the actual location in the disk. Each record is assigned an unique record number. Through this number, the physical address of a specified record can be identified with the following rule: sector = starting sector of the file + (S 1)/R (1) record number in the sector remainder of (S - 1)/R... (2) where S is the record number of the specified record and R is the number of records in each sector. In the key table file, the entries are stored in ascending order with respect to their numerical value of search key as well as record number. In order to minimize the mean number of comparisons to locate the desired record, the key table file is subdivided into blocks of length x. The optimal block size x is determined with respect to combined search methods so that the mean number of comparisons is minimized. In the key table file, each block is initially 90% filled, with the remainder reserved for overflow. After a period of time the key table is reorganized to avoid filling up the reserved overflow space. In case of filling up, an overflow signal is given, and a new key table and 10% reserved block space are automatically regenerated. Therefore, the logical structure of the data base does not need to be changed when the system is applied to a larger city like Taipei, which has 260,000 telephone subscribers. Every Chinese character is represented by an 18 X 15 dot matrix and is assigned an unique number as its code-i.e., its record number (see Figure 3). Hence each May 1975 w t v _ ~r I JL L I _-- _4 PI _I~_ Chinese character expressed in an 18 x 15 dot matr'ix Figure 3. record format: I -_-k dot matrix 36 bytes memory data of the dot matrix Chinese Character Pattern and the Record Format Chinese character needs 36 bytes for its dot matrix representation. There are 1400 Chinese characters in use in our present system. These are stored in ascending order with respect to frequency of usage, so that characters with high usage can be accessed (i.e., made core-resident) very rapidly.3 These 1400 character representations form a file called the Chinese character pattern file. To access a Chinese character, simply get this character's code and set R = 7 in formulas (1) and (2). Then, the location is found and the desired dot matrix of the character is displayed. This operation takes, at most, one disk access. The reasons for using a dot matrix rather than using other forms, such as the Chiao-Tung Radical System,5 are that it requires a smaller number of disk accesses and permits an elegant and symmetrical presentation of the Chinese character in display and print. (Typical video and hardcopy outputs are shown in Figures 4 and 5.) Relationship Between Search Methods and Optimal Block Size To locate a desired record Ri from the file, the search sequence is as follows. A user's name is first translated into phonetic spellings which are typed by an operator into the system through a keyboard; then the spellings are translated into a string of numerical codes which are used as a search key. (This input operation is illustrated in Figure 6.) The search key is first compared with each entry in the index table of n/x entries in order to locate the block, say Bj, where the desired record Ri is stored. In case of a match, each code of these Chinese characters in the Ri must search for the Chinese character pattern file in order to find out its corresponding dot matrix. From the dot matrix, this desired record Ri can be displayed and printed in Chinese. In case of mismatch, an error message will be sent to the operator. Depending on the received information, the operator can either retype the query or inform the requester to repeat his message. 51
4 E_ W _ - _ t ; GC a. b. c. d. Figure 4. The displayed result: (a) multiple-phone number record; (b) variable-length record; (c) subscribers with same name are distinguished by their addresses inside the parenthesis; (d) updated record shown in the second row. Among the various methods known on retrieving information records from a data base, we have chosen ISAM (indexed sequential access method) and binary search method in our application. For the time being, the other methods are unsuitable for our case. For example, the difficulties in using scatter storage techniques are (1) finding satisfactory hashing function so that, after hashing the phonetic spellings of Chinese characters, the search key can be uniformly'distributed in each block of the key table; and (2) estimating the suitable storage allocation scheme for the hashing table, because the number of telephone users is increased rapidly. This problem is particularly serious for a minicomputer with only 16K core memory. On the other hand, linear search is time-consuming. Therefore, it contradicts the requirement of real-time reply on inquiry. In order to minimize the mean number of comparisons to locate the record Ri from the block Bj, the problem of determining the optimal block size x with respect to search methods is solved as follows: (1) For a sequential search in the index block and the selected block Bj, the optimal block size is n1/2; (2) For a sequential search in the index table and binary search in the block Bj, the optimal block size is n.ln2/2; (3) For a binary search in the index table and the selected block Bj, the optimal block size is n/2; (4) For a binary search in the index table and sequential 52 search in the selected block Bj, the optimal block size does not exist; where n is the number of records in the telephone directory.** **Detailed proof: An ordered file of n records (either in fixed length or in variable length) is subdivided into blocks of length x. There are n/x blocks, each having x records. The optimal block size x with respect to various search methods is proved as follows: (1) For a sequential search in the index table and in the block 13the optimal block size is ny2. Proof: The mean number of comparisons to locate a record from the file is + t)(n/x)/(n/x) + l/2x(x + 1)/x /2((n/x) + 1) + /2(X +) =a 1/2((n/x) = di/dx = O e (-n/x2) x = n/2 d2i/dx2 2n/x3 = 2/nl/2 >0-O xmin x=n/2 = n'/2 (2) For a sequential search in the index table and binary search in the block Bi, the optimal block size is (n.ln2)/2. Proof: a =1/2(n/x + 1) + ((x + 1)(log2(x + 1))/x - 1) 1/2(n/x + 1) + (log2(x + 1) - 1) (See Reference I for x>10) da/dx= 0x =(n.ln2)/2 d2n/dx2 4/(ln2)3n2 >0 -xmin x= = (n.ln2)/2 (n.ln2)/2 COMPUTER
5 BWt (E rr3 ft r-3 t ta pt Io1\j& OIV il IRil 1kAEf# ftgb r,s Eb!X ti',l4 31U %B , ID I f k I e+3 tgn,44 ES L r th t- " >: X-x PCI. Vcw*Yf.T re' I P~P-q3-,, ZM, L 7 NI- L.tL =Ee W i8 b5939 3S S i ? DU f39 293'(' 'ujl-h3 QI3 ES~i , Figure 5. The Printed Result. The 5-digit numbers represent continued phone numbers-e.g., represents two telephone numbers 3163 and (3) For a binary search in the index table and the block Bj, the optimal block size is n. Proof: a = (log2(n/x + - 1) 1) + (log2(x + 1) - 1) da/dx= 0 x = n/2 d2i/dx2 = 2/nt/2(nl/2 + 1)2 >0 1x=n1/2 Xmin- n/2 (4) For a binary search in the index table and sequential search in the block Bj, the optimal block size does not exist. Proof: a = (log2(n/x + 1) - 1) + 1/2(x + 1) da/dx=0 -> x=0or-n This is impossible since x is a positive integer. In all, of these four expressions, the first term and the second term represent the formula of the mean number of comparisons in May 1975 Figure 6. User's name in Chinese (given by an inguirer) Phonetic spellings (typed by an operator on a keyboard) S{ 7 2 T- 1 <-72 Translated numeric value (system generated) Actual search key (starting to search) Typical Example of Input Operations for Searching a Telephone Record the index table and the selected block Bj respectively. For large n (e.g., n > 1000), the value of a in (2) and (3) is always less than the value in (1) whenever x = xmin; therefore, the binary search should be adopted in either the index table or the block B- or in both. 53
6 System Testing To insert a new record into the system, the whole information of a telephone record is first stored at the bottom of the telephone directory file. Then the record's search key (the phonetic spellings of the selected characters from the user's name) is stored at the appropriate location in the ordered key table file. This operation takes two disk accesses: one for writing the search key into the key table and one for writing the record in the telephone directory file. It takes an average of 10 seconds to key in a telephone record of 8 Chinese characters, which includes the character codes, the phonetic spellings of the search key, and the telephone number. Hence, the oiine insertion operation is not used in the testing system with one CPU during the busy hours (9-12 A.M. and 2-5 P.M. daily2). The modification is simple: the record to be modified is first fetched and displayed on the graphic display (see Figure 5); then the information needed to be added or deleted can be processed similarly to an edit operation. The system's regenerating time, defined as the time of regenerating the key table, equals b(2dt + pt)/n where b is the number of blocks in the key table, dt is the average disk access time, Pt is the CPU time, and n is the total number of records in the telephone directory file. Now, the system's regeneration time (i.e., rebuilding cost) is approximately 0.7 milliseconds per record. The total size of our utility programs is about 6K bytes, and the size of the data file is about 313K bytes in which 210K bytes are used for the telephone directory file, 50K bytes for the key table, and 53K bytes for the Chinese character pattern file. The total size of the system is about 320K bytes. The response time to display a record in Chinese depends on the number of Chinese characters in the retrieved record. On the average, it takes 30 milliseconds (the average access time of an HP/7900 disk) to access a Chinese character. In the worst case, it takes 0.24 sec to display a record of 8 Chinese characters on the HP/1331C graphic display. By comparison of the slowest system's response time (0.24 sec) with the quickest manual response time, when some of the most frequently used Chinese characters (about 100) are made core-resident, the system's response time will be improved to 200 times faster than that of a manual system.3 Acknowledgment The authors would like to acknowledge the corrections and suggestions of Dr. R. C. T. Lee and Mr. Pierre Loisel. They are also indebted to the referees' useful comments and colleagues' discussions in the Laboratories. References 1. G. Salton, Automatic Information Organization and Retrieval, McGraw-Hill Book Company, N. Y., C. C. Yang, "Statistic Analysis on the Traffic of Taipei Query Service Center," Quarterly Report of the Telecommunication Labs, Vol. 3, No. 4, pp , October C. V. Ramamoorthy and Y. H. Chin, "An Efficient Organization of Large Frequency Dependent Files for Binary Searching," IEEE Trans. on Computers, October 1971, pp S. K. Chang, C. S. Chiu, M. H. Yang, and B. S. Lin, "PEACE-A Phonetic Encoding and Chinese Editing System," Proceedings of the First International Symposium on Computers and Chinese I/O Systems, Academia Sinica, Taipei, Taiwan, R. 0. C., Aug , 1973, pp C. C. Hsieh, M. W. Du, et al., "The Chiao-Tung Radical System," Proceedings of the First International Symposium on Computers and Chinese I/O Systems, pp Yeh-hao Chin is an assistant professor in the Computer Sciences Department at Northwestern University. Earlier, he was with the Telecommunication Laboratories in Chung-Li, Taiwan, where he was responsible for the design and development of software systems for telephone service systems and electronic switching systems. During this period he was also a,,v! X i research fellow at the Electronic Laboratory of UC Berkeley, and an adjunct associate professor in the Computer Science Department of the National Chiao-Tung University. He received the BSEE from the National Taiwan University in 1966 and the MS and PhD degrees in electrical engineering from the University of Texas in 1970 and Dr. Chin's research and teaching interests are in the design and development of data base systems for Chinese input and output. t Ld+_ Jun Wun Jou is a research scientist at the Telecommunication Laboratories in Taiwan where he leads a group in designing an automatic telephone directory inquiry service system for the Taipei area. Jou received his MS degree from National Chiao-Tung University, Hsinchu, Taiwan, in He is a member of the Institute of Electrical Engineering of the Republic of China. System Improvement At the present, each operation takes a certain amount of disk accesses. The disk access includes not only record retrieval but also location of the Chinese characters in retrieved record-especially the time spent in locating the Chinese characters. In order to reduce the disk access time, the usage frequency of each Chinese character is being monitored so that those characters used most often can be made core-resident. Also, some coding methods such as threshold functions for query will be adopted to facilitate a user's query. The "best" threshold value is studied so that whenever a communication ax4iguity occurs, the misspelled phonetic input will still " e a correct answer (i.e., get the desired record). In summary, we plan to do the following in the near future: (1) make the input query format more flexible, (2) reduce the number of disk accesses, (3) modify and extend the operating system when the system is working in a time-sharing environment with multiple terminals. u 54 W. H. Peng works for the Telecommunication Laboratories in Chung-Li, Taiwan, where he is engaged in research programs concerning information storage and retrieval. He received the BSEE and MSEE from the National Chiao Tung University, Hsinchu, Taiwan, in 1968 and Chen Chau Yang is a research scientist in the Computer Scientist Group of the Telecommunication Laboratories, where he is in charge of the design and implementation of an system at the Taipei Query Station, Yang received the BSEE and MSEE from National received the BSEE and MSEE from National Chiao-Tung University, Hsinchu, Taiwan, in 1969 and 1971, and is a member of the Institute of Electrical Engineering of the Republic of China. His current research interests are in the field of information storag(e and retrieval. COMPUTER
Physical Data Organization
Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor
More informationRecord Storage and Primary File Organization
Record Storage and Primary File Organization 1 C H A P T E R 4 Contents Introduction Secondary Storage Devices Buffering of Blocks Placing File Records on Disk Operations on Files Files of Unordered Records
More information3 SOFTWARE AND PROGRAMMING LANGUAGES
3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have
More informationCopyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 13-1
Slide 13-1 Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible
More informationCHAPTER 13: DISK STORAGE, BASIC FILE STRUCTURES, AND HASHING
Chapter 13: Disk Storage, Basic File Structures, and Hashing 1 CHAPTER 13: DISK STORAGE, BASIC FILE STRUCTURES, AND HASHING Answers to Selected Exercises 13.23 Consider a disk with the following characteristics
More informationChapter 13 Disk Storage, Basic File Structures, and Hashing.
Chapter 13 Disk Storage, Basic File Structures, and Hashing. Copyright 2004 Pearson Education, Inc. Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files
More informationChapter 13. Disk Storage, Basic File Structures, and Hashing
Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible Hashing
More information2) What is the structure of an organization? Explain how IT support at different organizational levels.
(PGDIT 01) Paper - I : BASICS OF INFORMATION TECHNOLOGY 1) What is an information technology? Why you need to know about IT. 2) What is the structure of an organization? Explain how IT support at different
More informationBig Data Technology Map-Reduce Motivation: Indexing in Search Engines
Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process
More informationStorage and File Structure
Storage and File Structure Chapter 10: Storage and File Structure Overview of Physical Storage Media Magnetic Disks RAID Tertiary Storage Storage Access File Organization Organization of Records in Files
More informationChapter 13. Chapter Outline. Disk Storage, Basic File Structures, and Hashing
Chapter 13 Disk Storage, Basic File Structures, and Hashing Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files
More informationOperating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University
Operating Systems CSE 410, Spring 2004 File Management Stephen Wagner Michigan State University File Management File management system has traditionally been considered part of the operating system. Applications
More informationUnit 4.3 - Storage Structures 1. Storage Structures. Unit 4.3
Storage Structures Unit 4.3 Unit 4.3 - Storage Structures 1 The Physical Store Storage Capacity Medium Transfer Rate Seek Time Main Memory 800 MB/s 500 MB Instant Hard Drive 10 MB/s 120 GB 10 ms CD-ROM
More informationINTRODUCTION The collection of data that makes up a computerized database must be stored physically on some computer storage medium.
Chapter 4: Record Storage and Primary File Organization 1 Record Storage and Primary File Organization INTRODUCTION The collection of data that makes up a computerized database must be stored physically
More information6. Storage and File Structures
ECS-165A WQ 11 110 6. Storage and File Structures Goals Understand the basic concepts underlying different storage media, buffer management, files structures, and organization of records in files. Contents
More informationChapter 6: Physical Database Design and Performance. Database Development Process. Physical Design Process. Physical Database Design
Chapter 6: Physical Database Design and Performance Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden Robert C. Nickerson ISYS 464 Spring 2003 Topic 23 Database
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationOutline. mass storage hash functions. logical key values nested tables. storing information between executions using DBM files
Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested tables 3 Persistent Data storing information between executions using DBM files 4 Rule Based Programming
More informationMachine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.
1 Topics Machine Architecture and Number Systems Major Computer Components Bits, Bytes, and Words The Decimal Number System The Binary Number System Converting from Decimal to Binary Major Computer Components
More informationChapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
More informationChapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
More informationFiles. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file?
Files What s it all about? Information being stored about anything important to the business/individual keeping the files. The simple concepts used in the operation of manual files are often a good guide
More informationCHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationFigure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationChapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan
Chapter 2 Basic Structure of Computers Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Functional Units Basic Operational Concepts Bus Structures Software
More informationChapter 8: Structures for Files. Truong Quynh Chi tqchi@cse.hcmut.edu.vn. Spring- 2013
Chapter 8: Data Storage, Indexing Structures for Files Truong Quynh Chi tqchi@cse.hcmut.edu.vn Spring- 2013 Overview of Database Design Process 2 Outline Data Storage Disk Storage Devices Files of Records
More informationCS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen
CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen LECTURE 14: DATA STORAGE AND REPRESENTATION Data Storage Memory Hierarchy Disks Fields, Records, Blocks Variable-length
More informationMULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.
More informationUniversity of Dublin Trinity College. Storage Hardware. Owen.Conlan@cs.tcd.ie
University of Dublin Trinity College Storage Hardware Owen.Conlan@cs.tcd.ie Hardware Issues Hard Disk/SSD CPU Cache Main Memory CD ROM/RW DVD ROM/RW Tapes Primary Storage Floppy Disk/ Memory Stick Secondary
More informationManagement Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
More informationChapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
More informationChap-02, Hardware and Software. Hardware Model
Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit
More informationChapter 1 Computer System Overview
Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides
More informationFuture Trends in Mobile Communication for Distributed Database Based Location Management
IJCST Vo l. 4, Is s u e Sp l - 3, Ju l y - Se p t 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Future Trends in Mobile Communication for Distributed Database Based Location Management 1 Dr.
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationDesign and Development of Virtual Instrument (VI) Modules for an Introductory Digital Logic Course
Session ENG 206-6 Design and Development of Virtual Instrument (VI) Modules for an Introductory Digital Logic Course Nikunja Swain, Ph.D., PE South Carolina State University swain@scsu.edu Raghu Korrapati,
More informationFile Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
More informationFILE MANAGEMENT CHAPTER
M12_STAL6329_06_SE_C12.QXD 2/21/08 9:40 PM Page 551 FILE MANAGEMENT CHAPTER 12.1 Overview Files and File systems File Structure File Management Systems 12.2 File Organization and Access The Pile The Sequential
More informationNew Hash Function Construction for Textual and Geometric Data Retrieval
Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan
More informationFile Management. File Management
File Management 1 File Management File management system consists of system utility programs that run as privileged applications Input to applications is by means of a file Output is saved in a file for
More informationMultiple Choice Questions(Computer)
Multiple Choice Questions(Computer) 1. Which of the following is the product of data processing a. information b. data c. software program d. system 2. The process of putting data into a location is called
More informationHIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND IGNORING SPELLING ERROR IN SEARCH KEY BASED ON DOUBLE METAPHONE ALGORITHM
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND IGNORING SPELLING ERROR IN SEARCH KEY BASED ON DOUBLE METAPHONE ALGORITHM Md. Palash Uddin 1, Ashfaque Ahmed 2, Md. Delowar Hossain
More informationChapter 1 File Organization 1.0 OBJECTIVES 1.1 INTRODUCTION 1.2 STORAGE DEVICES CHARACTERISTICS
Chapter 1 File Organization 1.0 Objectives 1.1 Introduction 1.2 Storage Devices Characteristics 1.3 File Organization 1.3.1 Sequential Files 1.3.2 Indexing and Methods of Indexing 1.3.3 Hash Files 1.4
More informationBM307 File Organization
BM307 File Organization Gazi University Computer Engineering Department 9/24/2014 1 Index Sequential File Organization Binary Search Interpolation Search Self-Organizing Sequential Search Direct File Organization
More informationLecture 1: Data Storage & Index
Lecture 1: Data Storage & Index R&G Chapter 8-11 Concurrency control Query Execution and Optimization Relational Operators File & Access Methods Buffer Management Disk Space Management Recovery Manager
More informationParts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
More informationDATA PROCESSING FOR COMMUNICATION NETWORK MONITORING AND CONTROL
DATA PROCESSING FOR COMMUNICATION NETWORK MONITORING AND CONTROL D. I. Caplan Surface Communications Division Radio Corporation of America Camden 2, New Jersey The long-haul communications network is the
More information86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
More informationInformation Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.
Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary
More informationACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU
Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents
More informationComputer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
More informationHow To Understand The History Of An Operating System
7 Operating Systems 7.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 7.2 Understand the role of the operating system.
More informationCOURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A. PREREQUISITE: None. Concurrent enrollment in CIS-96 or CIS-97 is recommended.
Degree Credit _X Non Credit Nondegree Credit Comm Service COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A COURSE DESCRIPTION 3 Units 1A Introduction to Computer Information Systems PREREQUISITE: None. Concurrent
More informationFile-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
More informationENHANCEMENTS TO SQL SERVER COLUMN STORES. Anuhya Mallempati #2610771
ENHANCEMENTS TO SQL SERVER COLUMN STORES Anuhya Mallempati #2610771 CONTENTS Abstract Introduction Column store indexes Batch mode processing Other Enhancements Conclusion ABSTRACT SQL server introduced
More informationData storage Tree indexes
Data storage Tree indexes Rasmus Pagh February 7 lecture 1 Access paths For many database queries and updates, only a small fraction of the data needs to be accessed. Extreme examples are looking or updating
More informationStreaming Lossless Data Compression Algorithm (SLDC)
Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch
More informationSoftware: Systems and Application Software
Software: Systems and Application Software Computer Software Operating System Popular Operating Systems Language Translators Utility Programs Applications Programs Types of Application Software Personal
More information1.1 Electronic Computers Then and Now
1.1 Electronic Computers Then and Now The first electronic computer was built in the late 1930s by Dr.John Atanasoff and Clifford Berry at Iowa State University in USA. They designed their computer to
More informationCyber Forensic for Hadoop based Cloud System
Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division
More informationA Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
More informationNOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)
Revised 5/2010 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Course Description Covers computer concepts and Internet skills and uses a software
More informationTHE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
More informationChapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
More informationStorage Management for Files of Dynamic Records
Storage Management for Files of Dynamic Records Justin Zobel Department of Computer Science, RMIT, GPO Box 2476V, Melbourne 3001, Australia. jz@cs.rmit.edu.au Alistair Moffat Department of Computer Science
More informationCOMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
More informationOverview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16
HNC Computing - s HNC Computing - s Physical Overview Process What techniques are available for physical design? Physical Explain one physical design technique. Modern Management McFadden/Hoffer Chapter
More informationChapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.
Chapter 1 CD-ROM stands for: a. Compact Disk Random Only Memory b. Compact Disk Read Only Memory c. Computer Device Read Only Memory d. Computer Disk Random Online Memory Control Unit (CU) is the a. Main
More informationThe Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform
The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform Fong-Hao Liu, Ya-Ruei Liou, Hsiang-Fu Lo, Ko-Chin Chang, and Wei-Tsong Lee Abstract Virtualization platform solutions
More informationTHREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
More informationæ A collection of interrelated and persistent data èusually referred to as the database èdbèè.
CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection
More informationIntroduction. What is an Operating System?
Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization
More informationHow To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
More informationFast Arithmetic Coding (FastAC) Implementations
Fast Arithmetic Coding (FastAC) Implementations Amir Said 1 Introduction This document describes our fast implementations of arithmetic coding, which achieve optimal compression and higher throughput by
More informationSection 1.4 Place Value Systems of Numeration in Other Bases
Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason
More information10CS35: Data Structures Using C
CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a
More informationDatabase 2 Lecture I. Alessandro Artale
Free University of Bolzano Database 2. Lecture I, 2003/2004 A.Artale (1) Database 2 Lecture I Alessandro Artale Faculty of Computer Science Free University of Bolzano Room: 221 artale@inf.unibz.it http://www.inf.unibz.it/
More informationtechnology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels
technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California
More informationRecording Supervisor Manual Presence Software
Presence Software Version 9.2 Date: 09/2014 2 Contents... 3 1. Introduction... 4 2. Installation and configuration... 5 3. Presence Recording architectures Operating modes... 5 Integrated... with Presence
More informationFile System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
More informationREMOTE REAL -TIME PROCESS AND PRODUCTION MONITORING MECHANISM OF LIGHTING PARTS
REMOTE REAL -TIME PROCESS AND PRODUCTION MONITORING MECHANISM OF LIGHTING PARTS FOR OUTDOOR RECREATION ABSTRACT Cheng-I Hou 1, Han-Chen Huang 2*, Tian-Syung Lan 1, Wei-Min Teng 1 1 Yu Da University of
More informationTHE SOCIETY OF BUSINESS PRACTITIONERS
THE SOCIETY OF BUSINESS PRACTITIONERS CERTIIFIICATE IIN BUSINESS ADMIINIISTRATI ION This is an introductory course to the fundamental principles of business studies. Students who have the necessary GCE
More informationSpecifications of Paradox for Windows
Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationMapReduce With Columnar Storage
SEMINAR: COLUMNAR DATABASES 1 MapReduce With Columnar Storage Peitsa Lähteenmäki Abstract The MapReduce programming paradigm has achieved more popularity over the last few years as an option to distributed
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationMS Access: Advanced Tables and Queries. Lesson Notes Author: Pamela Schmidt
Lesson Notes Author: Pamela Schmidt Tables Text Fields (Default) Text or combinations of text and numbers, as well as numbers that don't require calculations, such as phone numbers. or the length set by
More informationWESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math
Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit
More informationPerformance evaluation of Web Information Retrieval Systems and its application to e-business
Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,
More informationChapter 12 File Management
Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts
More informationPrinciples of Database Management Systems. Overview. Principles of Data Layout. Topic for today. "Executive Summary": here.
Topic for today Principles of Database Management Systems Pekka Kilpeläinen (after Stanford CS245 slide originals by Hector Garcia-Molina, Jeff Ullman and Jennifer Widom) How to represent data on disk
More informationMADR Algorithm to Recover Authenticity from Damage of the Important Data
, pp. 443-452 http://dx.doi.org/10.14257/ijmue.2014.9.12.39 MADR Algorithm to Recover Authenticity from Damage of the Important Data Seong-Ho An 1, * Kihyo Nam 2, Mun-Kweon Jeong 2 and Yong-Rak Choi 1
More informationBenchmarking Cassandra on Violin
Technical White Paper Report Technical Report Benchmarking Cassandra on Violin Accelerating Cassandra Performance and Reducing Read Latency With Violin Memory Flash-based Storage Arrays Version 1.0 Abstract
More informationHIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India derahul@ieee.org 2 Bangalore University, India ABSTRACT
More informationLogic gates. Chapter. 9.1 Logic gates. MIL symbols. Learning Summary. In this chapter you will learn about: Logic gates
Chapter 9 Logic gates Learning Summary In this chapter you will learn about: Logic gates Truth tables Logic circuits/networks In this chapter we will look at how logic gates are used and how truth tables
More informationDatabase Fundamentals
Database Fundamentals Computer Science 105 Boston University David G. Sullivan, Ph.D. Bit = 0 or 1 Measuring Data: Bits and Bytes One byte is 8 bits. example: 01101100 Other common units: name approximate
More informationICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001
ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel
More information