Special Feature: system's slowest response time (0.24 sec) with the quickest manual response time, the system is at least 130 times

Size: px
Start display at page:

Download "Special Feature: system's slowest response time (0.24 sec) with the quickest manual response time, the system is at least 130 times"

Transcription

1 Special Feature: An Automated Chinese Telephone Directory Y. H. Chin, J. W. Jou, W. H. Peng, and C. C. Yang Telecommunication Laboratories of Taiwan Introduction A real-time, on-line information storage and retrieval system for telephone information service has been designed at the Telecommunication Laboratories of Taiwan. The input and output of the system are processed in Chinese via a keyboard and a graphic display unit respectively. System functions include sorting, merging, updating, displaying, and printing of data. In order to avoid a serial, exhaustive search, the file is subdivided into blocks of length x. The optimal size of each block is determined so as to minimize the average number of comparisons (file accesses) to locate a record. The system has been tested on a telephone office of medium capacity-about 8000 subscribers. The number of daily queries is about 1600 and the updating rate is approximately 50. On the basis of a comparison of the May 1975 system's slowest response time (0.24 sec) with the quickest manual response time, the system is at least 130 times faster. The design philosophy stresses fast responses to queries and quick updating of the data. For a computer, a Chinese character is not a character but a pattern; therefore, a portion of the coding is related to Chinese. System Description The system hardware (see Figure 1) consists of an HP/2100A computer under the control of the Moving-Head Disk Operating System (DOS-III). Two secondary storage devices are attached: a moving head disk unit and a magnetic tape unit. The disk unit is used to store the system programs, utility programs, and data files. The data 49

2 PHONETIC SYMBOL KEYBOARD GRAPHIC DISPLAY TAPE READER ELECTROSTATIC PRINTER ~~~~~~~~~~~MAGNETIC DISK TAPE Figure 1. System Block Diagram of the Automatic Telephone Directory Inquiry Services System KEY TABLE key record number TELEPHONE DIRECTORY F ILE record 1 record CHINESE CHARACTER PATTERN FILE (dot matrix) record 1 record m record k Displaying (a) Data Base Structure and Searching Sequence of Telephone Directory Data Base LI user's name 16 s Tel. No. I pointer I 3 s 2 s (b) Record Format for Telephone Directory File I Figure 2. Logical Structure of Data Base files contain the telephone directory file and the Chinese consonants and 16 vowels. The phonetic spellings are character pattern file. The magnetic tape is used as a translated into a string of numerical codes which is used as backup unit. The addresses of the telephone subscribers are a search key to locate the desired record and to display it in stored on the tape for printing of the telephone book.* Chinese. Input devices consist of a paper tape reader, used as a main input device for reading utility programs and data *In general, an operator finds a user's phone number whenever a, keyboard, Muser's name is given in a query. Therefore, the operator at the X which is used to type thephonet icsym spellingseof the service center has no need to find a phone number through a home i t which is used to type the phonetic spellings of the input address of a particular subscriber. In fact, the subscriber's address Chinese characters,4 contains 37 phonetic symbols-21 is confidential at the Query Service Center. 50 COMPUTER

3 Output devices include an HP/1331C X-Y graphic display, which is used to display the desired telephone record in Chinese, and an electrostatic printer (a VERSATEC plotter) for printing the telephone book in Chinese. The speed is about two lines/sec in Chinese characters. Depending on the size of the printed Chinese character, each line can contain 40 to 80 Chinese characters. Except the DOS-III system program, we developed our own utility programs for handling data processing. The functions of these programs are searching, sorting, merging, converting, updating, displaying, printing, and plotting. Data Base Structure In this system we have two data bases: a telephone directory data base and a Chinese character pattern data base. The telephone directory data base is a three-level indexed sequential file containing three files: (1) index table, (2) key table, and (3) telephone directory file (Figure 2a). The record format of the key table has 6 bytes for the search key, 2 bytes for the corresponding record number in the telephone directory file, and 2 bytes for a pointer used for updating. The variable-length record format of the telephone directory file (Figure 2b) consists of three fixed-length fields: a 32-byte name field, which is a variable-length field containing 1 to 16 Chinese character codes, a 6-byte telephone number field, and a 4-byte pointer field for printing the telephone- book. Since each sector (256 bytes) can store six 42-byte records, it is very easy to calculate the actual location in the disk. Each record is assigned an unique record number. Through this number, the physical address of a specified record can be identified with the following rule: sector = starting sector of the file + (S 1)/R (1) record number in the sector remainder of (S - 1)/R... (2) where S is the record number of the specified record and R is the number of records in each sector. In the key table file, the entries are stored in ascending order with respect to their numerical value of search key as well as record number. In order to minimize the mean number of comparisons to locate the desired record, the key table file is subdivided into blocks of length x. The optimal block size x is determined with respect to combined search methods so that the mean number of comparisons is minimized. In the key table file, each block is initially 90% filled, with the remainder reserved for overflow. After a period of time the key table is reorganized to avoid filling up the reserved overflow space. In case of filling up, an overflow signal is given, and a new key table and 10% reserved block space are automatically regenerated. Therefore, the logical structure of the data base does not need to be changed when the system is applied to a larger city like Taipei, which has 260,000 telephone subscribers. Every Chinese character is represented by an 18 X 15 dot matrix and is assigned an unique number as its code-i.e., its record number (see Figure 3). Hence each May 1975 w t v _ ~r I JL L I _-- _4 PI _I~_ Chinese character expressed in an 18 x 15 dot matr'ix Figure 3. record format: I -_-k dot matrix 36 bytes memory data of the dot matrix Chinese Character Pattern and the Record Format Chinese character needs 36 bytes for its dot matrix representation. There are 1400 Chinese characters in use in our present system. These are stored in ascending order with respect to frequency of usage, so that characters with high usage can be accessed (i.e., made core-resident) very rapidly.3 These 1400 character representations form a file called the Chinese character pattern file. To access a Chinese character, simply get this character's code and set R = 7 in formulas (1) and (2). Then, the location is found and the desired dot matrix of the character is displayed. This operation takes, at most, one disk access. The reasons for using a dot matrix rather than using other forms, such as the Chiao-Tung Radical System,5 are that it requires a smaller number of disk accesses and permits an elegant and symmetrical presentation of the Chinese character in display and print. (Typical video and hardcopy outputs are shown in Figures 4 and 5.) Relationship Between Search Methods and Optimal Block Size To locate a desired record Ri from the file, the search sequence is as follows. A user's name is first translated into phonetic spellings which are typed by an operator into the system through a keyboard; then the spellings are translated into a string of numerical codes which are used as a search key. (This input operation is illustrated in Figure 6.) The search key is first compared with each entry in the index table of n/x entries in order to locate the block, say Bj, where the desired record Ri is stored. In case of a match, each code of these Chinese characters in the Ri must search for the Chinese character pattern file in order to find out its corresponding dot matrix. From the dot matrix, this desired record Ri can be displayed and printed in Chinese. In case of mismatch, an error message will be sent to the operator. Depending on the received information, the operator can either retype the query or inform the requester to repeat his message. 51

4 E_ W _ - _ t ; GC a. b. c. d. Figure 4. The displayed result: (a) multiple-phone number record; (b) variable-length record; (c) subscribers with same name are distinguished by their addresses inside the parenthesis; (d) updated record shown in the second row. Among the various methods known on retrieving information records from a data base, we have chosen ISAM (indexed sequential access method) and binary search method in our application. For the time being, the other methods are unsuitable for our case. For example, the difficulties in using scatter storage techniques are (1) finding satisfactory hashing function so that, after hashing the phonetic spellings of Chinese characters, the search key can be uniformly'distributed in each block of the key table; and (2) estimating the suitable storage allocation scheme for the hashing table, because the number of telephone users is increased rapidly. This problem is particularly serious for a minicomputer with only 16K core memory. On the other hand, linear search is time-consuming. Therefore, it contradicts the requirement of real-time reply on inquiry. In order to minimize the mean number of comparisons to locate the record Ri from the block Bj, the problem of determining the optimal block size x with respect to search methods is solved as follows: (1) For a sequential search in the index block and the selected block Bj, the optimal block size is n1/2; (2) For a sequential search in the index table and binary search in the block Bj, the optimal block size is n.ln2/2; (3) For a binary search in the index table and the selected block Bj, the optimal block size is n/2; (4) For a binary search in the index table and sequential 52 search in the selected block Bj, the optimal block size does not exist; where n is the number of records in the telephone directory.** **Detailed proof: An ordered file of n records (either in fixed length or in variable length) is subdivided into blocks of length x. There are n/x blocks, each having x records. The optimal block size x with respect to various search methods is proved as follows: (1) For a sequential search in the index table and in the block 13the optimal block size is ny2. Proof: The mean number of comparisons to locate a record from the file is + t)(n/x)/(n/x) + l/2x(x + 1)/x /2((n/x) + 1) + /2(X +) =a 1/2((n/x) = di/dx = O e (-n/x2) x = n/2 d2i/dx2 2n/x3 = 2/nl/2 >0-O xmin x=n/2 = n'/2 (2) For a sequential search in the index table and binary search in the block Bi, the optimal block size is (n.ln2)/2. Proof: a =1/2(n/x + 1) + ((x + 1)(log2(x + 1))/x - 1) 1/2(n/x + 1) + (log2(x + 1) - 1) (See Reference I for x>10) da/dx= 0x =(n.ln2)/2 d2n/dx2 4/(ln2)3n2 >0 -xmin x= = (n.ln2)/2 (n.ln2)/2 COMPUTER

5 BWt (E rr3 ft r-3 t ta pt Io1\j& OIV il IRil 1kAEf# ftgb r,s Eb!X ti',l4 31U %B , ID I f k I e+3 tgn,44 ES L r th t- " >: X-x PCI. Vcw*Yf.T re' I P~P-q3-,, ZM, L 7 NI- L.tL =Ee W i8 b5939 3S S i ? DU f39 293'(' 'ujl-h3 QI3 ES~i , Figure 5. The Printed Result. The 5-digit numbers represent continued phone numbers-e.g., represents two telephone numbers 3163 and (3) For a binary search in the index table and the block Bj, the optimal block size is n. Proof: a = (log2(n/x + - 1) 1) + (log2(x + 1) - 1) da/dx= 0 x = n/2 d2i/dx2 = 2/nt/2(nl/2 + 1)2 >0 1x=n1/2 Xmin- n/2 (4) For a binary search in the index table and sequential search in the block Bj, the optimal block size does not exist. Proof: a = (log2(n/x + 1) - 1) + 1/2(x + 1) da/dx=0 -> x=0or-n This is impossible since x is a positive integer. In all, of these four expressions, the first term and the second term represent the formula of the mean number of comparisons in May 1975 Figure 6. User's name in Chinese (given by an inguirer) Phonetic spellings (typed by an operator on a keyboard) S{ 7 2 T- 1 <-72 Translated numeric value (system generated) Actual search key (starting to search) Typical Example of Input Operations for Searching a Telephone Record the index table and the selected block Bj respectively. For large n (e.g., n > 1000), the value of a in (2) and (3) is always less than the value in (1) whenever x = xmin; therefore, the binary search should be adopted in either the index table or the block B- or in both. 53

6 System Testing To insert a new record into the system, the whole information of a telephone record is first stored at the bottom of the telephone directory file. Then the record's search key (the phonetic spellings of the selected characters from the user's name) is stored at the appropriate location in the ordered key table file. This operation takes two disk accesses: one for writing the search key into the key table and one for writing the record in the telephone directory file. It takes an average of 10 seconds to key in a telephone record of 8 Chinese characters, which includes the character codes, the phonetic spellings of the search key, and the telephone number. Hence, the oiine insertion operation is not used in the testing system with one CPU during the busy hours (9-12 A.M. and 2-5 P.M. daily2). The modification is simple: the record to be modified is first fetched and displayed on the graphic display (see Figure 5); then the information needed to be added or deleted can be processed similarly to an edit operation. The system's regenerating time, defined as the time of regenerating the key table, equals b(2dt + pt)/n where b is the number of blocks in the key table, dt is the average disk access time, Pt is the CPU time, and n is the total number of records in the telephone directory file. Now, the system's regeneration time (i.e., rebuilding cost) is approximately 0.7 milliseconds per record. The total size of our utility programs is about 6K bytes, and the size of the data file is about 313K bytes in which 210K bytes are used for the telephone directory file, 50K bytes for the key table, and 53K bytes for the Chinese character pattern file. The total size of the system is about 320K bytes. The response time to display a record in Chinese depends on the number of Chinese characters in the retrieved record. On the average, it takes 30 milliseconds (the average access time of an HP/7900 disk) to access a Chinese character. In the worst case, it takes 0.24 sec to display a record of 8 Chinese characters on the HP/1331C graphic display. By comparison of the slowest system's response time (0.24 sec) with the quickest manual response time, when some of the most frequently used Chinese characters (about 100) are made core-resident, the system's response time will be improved to 200 times faster than that of a manual system.3 Acknowledgment The authors would like to acknowledge the corrections and suggestions of Dr. R. C. T. Lee and Mr. Pierre Loisel. They are also indebted to the referees' useful comments and colleagues' discussions in the Laboratories. References 1. G. Salton, Automatic Information Organization and Retrieval, McGraw-Hill Book Company, N. Y., C. C. Yang, "Statistic Analysis on the Traffic of Taipei Query Service Center," Quarterly Report of the Telecommunication Labs, Vol. 3, No. 4, pp , October C. V. Ramamoorthy and Y. H. Chin, "An Efficient Organization of Large Frequency Dependent Files for Binary Searching," IEEE Trans. on Computers, October 1971, pp S. K. Chang, C. S. Chiu, M. H. Yang, and B. S. Lin, "PEACE-A Phonetic Encoding and Chinese Editing System," Proceedings of the First International Symposium on Computers and Chinese I/O Systems, Academia Sinica, Taipei, Taiwan, R. 0. C., Aug , 1973, pp C. C. Hsieh, M. W. Du, et al., "The Chiao-Tung Radical System," Proceedings of the First International Symposium on Computers and Chinese I/O Systems, pp Yeh-hao Chin is an assistant professor in the Computer Sciences Department at Northwestern University. Earlier, he was with the Telecommunication Laboratories in Chung-Li, Taiwan, where he was responsible for the design and development of software systems for telephone service systems and electronic switching systems. During this period he was also a,,v! X i research fellow at the Electronic Laboratory of UC Berkeley, and an adjunct associate professor in the Computer Science Department of the National Chiao-Tung University. He received the BSEE from the National Taiwan University in 1966 and the MS and PhD degrees in electrical engineering from the University of Texas in 1970 and Dr. Chin's research and teaching interests are in the design and development of data base systems for Chinese input and output. t Ld+_ Jun Wun Jou is a research scientist at the Telecommunication Laboratories in Taiwan where he leads a group in designing an automatic telephone directory inquiry service system for the Taipei area. Jou received his MS degree from National Chiao-Tung University, Hsinchu, Taiwan, in He is a member of the Institute of Electrical Engineering of the Republic of China. System Improvement At the present, each operation takes a certain amount of disk accesses. The disk access includes not only record retrieval but also location of the Chinese characters in retrieved record-especially the time spent in locating the Chinese characters. In order to reduce the disk access time, the usage frequency of each Chinese character is being monitored so that those characters used most often can be made core-resident. Also, some coding methods such as threshold functions for query will be adopted to facilitate a user's query. The "best" threshold value is studied so that whenever a communication ax4iguity occurs, the misspelled phonetic input will still " e a correct answer (i.e., get the desired record). In summary, we plan to do the following in the near future: (1) make the input query format more flexible, (2) reduce the number of disk accesses, (3) modify and extend the operating system when the system is working in a time-sharing environment with multiple terminals. u 54 W. H. Peng works for the Telecommunication Laboratories in Chung-Li, Taiwan, where he is engaged in research programs concerning information storage and retrieval. He received the BSEE and MSEE from the National Chiao Tung University, Hsinchu, Taiwan, in 1968 and Chen Chau Yang is a research scientist in the Computer Scientist Group of the Telecommunication Laboratories, where he is in charge of the design and implementation of an system at the Taipei Query Station, Yang received the BSEE and MSEE from National received the BSEE and MSEE from National Chiao-Tung University, Hsinchu, Taiwan, in 1969 and 1971, and is a member of the Institute of Electrical Engineering of the Republic of China. His current research interests are in the field of information storag(e and retrieval. COMPUTER

Physical Data Organization

Physical Data Organization Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor

More information

Record Storage and Primary File Organization

Record Storage and Primary File Organization Record Storage and Primary File Organization 1 C H A P T E R 4 Contents Introduction Secondary Storage Devices Buffering of Blocks Placing File Records on Disk Operations on Files Files of Unordered Records

More information

3 SOFTWARE AND PROGRAMMING LANGUAGES

3 SOFTWARE AND PROGRAMMING LANGUAGES 3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have

More information

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 13-1

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 13-1 Slide 13-1 Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible

More information

CHAPTER 13: DISK STORAGE, BASIC FILE STRUCTURES, AND HASHING

CHAPTER 13: DISK STORAGE, BASIC FILE STRUCTURES, AND HASHING Chapter 13: Disk Storage, Basic File Structures, and Hashing 1 CHAPTER 13: DISK STORAGE, BASIC FILE STRUCTURES, AND HASHING Answers to Selected Exercises 13.23 Consider a disk with the following characteristics

More information

Chapter 13 Disk Storage, Basic File Structures, and Hashing.

Chapter 13 Disk Storage, Basic File Structures, and Hashing. Chapter 13 Disk Storage, Basic File Structures, and Hashing. Copyright 2004 Pearson Education, Inc. Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files

More information

Chapter 13. Disk Storage, Basic File Structures, and Hashing

Chapter 13. Disk Storage, Basic File Structures, and Hashing Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible Hashing

More information

2) What is the structure of an organization? Explain how IT support at different organizational levels.

2) What is the structure of an organization? Explain how IT support at different organizational levels. (PGDIT 01) Paper - I : BASICS OF INFORMATION TECHNOLOGY 1) What is an information technology? Why you need to know about IT. 2) What is the structure of an organization? Explain how IT support at different

More information

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process

More information

Storage and File Structure

Storage and File Structure Storage and File Structure Chapter 10: Storage and File Structure Overview of Physical Storage Media Magnetic Disks RAID Tertiary Storage Storage Access File Organization Organization of Records in Files

More information

Chapter 13. Chapter Outline. Disk Storage, Basic File Structures, and Hashing

Chapter 13. Chapter Outline. Disk Storage, Basic File Structures, and Hashing Chapter 13 Disk Storage, Basic File Structures, and Hashing Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files

More information

Operating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University

Operating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University Operating Systems CSE 410, Spring 2004 File Management Stephen Wagner Michigan State University File Management File management system has traditionally been considered part of the operating system. Applications

More information

Unit 4.3 - Storage Structures 1. Storage Structures. Unit 4.3

Unit 4.3 - Storage Structures 1. Storage Structures. Unit 4.3 Storage Structures Unit 4.3 Unit 4.3 - Storage Structures 1 The Physical Store Storage Capacity Medium Transfer Rate Seek Time Main Memory 800 MB/s 500 MB Instant Hard Drive 10 MB/s 120 GB 10 ms CD-ROM

More information

INTRODUCTION The collection of data that makes up a computerized database must be stored physically on some computer storage medium.

INTRODUCTION The collection of data that makes up a computerized database must be stored physically on some computer storage medium. Chapter 4: Record Storage and Primary File Organization 1 Record Storage and Primary File Organization INTRODUCTION The collection of data that makes up a computerized database must be stored physically

More information

6. Storage and File Structures

6. Storage and File Structures ECS-165A WQ 11 110 6. Storage and File Structures Goals Understand the basic concepts underlying different storage media, buffer management, files structures, and organization of records in files. Contents

More information

Chapter 6: Physical Database Design and Performance. Database Development Process. Physical Design Process. Physical Database Design

Chapter 6: Physical Database Design and Performance. Database Development Process. Physical Design Process. Physical Database Design Chapter 6: Physical Database Design and Performance Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden Robert C. Nickerson ISYS 464 Spring 2003 Topic 23 Database

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Outline. mass storage hash functions. logical key values nested tables. storing information between executions using DBM files

Outline. mass storage hash functions. logical key values nested tables. storing information between executions using DBM files Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested tables 3 Persistent Data storing information between executions using DBM files 4 Rule Based Programming

More information

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory. 1 Topics Machine Architecture and Number Systems Major Computer Components Bits, Bytes, and Words The Decimal Number System The Binary Number System Converting from Decimal to Binary Major Computer Components

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access

More information

Chapter 12 File Management. Roadmap

Chapter 12 File Management. Roadmap Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access

More information

Files. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file?

Files. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file? Files What s it all about? Information being stored about anything important to the business/individual keeping the files. The simple concepts used in the operation of manual files are often a good guide

More information

CHAPTER 17: File Management

CHAPTER 17: File Management CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Chapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan

Chapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Chapter 2 Basic Structure of Computers Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Functional Units Basic Operational Concepts Bus Structures Software

More information

Chapter 8: Structures for Files. Truong Quynh Chi tqchi@cse.hcmut.edu.vn. Spring- 2013

Chapter 8: Structures for Files. Truong Quynh Chi tqchi@cse.hcmut.edu.vn. Spring- 2013 Chapter 8: Data Storage, Indexing Structures for Files Truong Quynh Chi tqchi@cse.hcmut.edu.vn Spring- 2013 Overview of Database Design Process 2 Outline Data Storage Disk Storage Devices Files of Records

More information

CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen

CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen LECTURE 14: DATA STORAGE AND REPRESENTATION Data Storage Memory Hierarchy Disks Fields, Records, Blocks Variable-length

More information

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

MULTIPLE CHOICE FREE RESPONSE QUESTIONS MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.

More information

University of Dublin Trinity College. Storage Hardware. Owen.Conlan@cs.tcd.ie

University of Dublin Trinity College. Storage Hardware. Owen.Conlan@cs.tcd.ie University of Dublin Trinity College Storage Hardware Owen.Conlan@cs.tcd.ie Hardware Issues Hard Disk/SSD CPU Cache Main Memory CD ROM/RW DVD ROM/RW Tapes Primary Storage Floppy Disk/ Memory Stick Secondary

More information

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System? Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers

More information

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation

More information

Chap-02, Hardware and Software. Hardware Model

Chap-02, Hardware and Software. Hardware Model Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit

More information

Chapter 1 Computer System Overview

Chapter 1 Computer System Overview Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides

More information

Future Trends in Mobile Communication for Distributed Database Based Location Management

Future Trends in Mobile Communication for Distributed Database Based Location Management IJCST Vo l. 4, Is s u e Sp l - 3, Ju l y - Se p t 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Future Trends in Mobile Communication for Distributed Database Based Location Management 1 Dr.

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Design and Development of Virtual Instrument (VI) Modules for an Introductory Digital Logic Course

Design and Development of Virtual Instrument (VI) Modules for an Introductory Digital Logic Course Session ENG 206-6 Design and Development of Virtual Instrument (VI) Modules for an Introductory Digital Logic Course Nikunja Swain, Ph.D., PE South Carolina State University swain@scsu.edu Raghu Korrapati,

More information

File Management. Chapter 12

File Management. Chapter 12 Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution

More information

FILE MANAGEMENT CHAPTER

FILE MANAGEMENT CHAPTER M12_STAL6329_06_SE_C12.QXD 2/21/08 9:40 PM Page 551 FILE MANAGEMENT CHAPTER 12.1 Overview Files and File systems File Structure File Management Systems 12.2 File Organization and Access The Pile The Sequential

More information

New Hash Function Construction for Textual and Geometric Data Retrieval

New Hash Function Construction for Textual and Geometric Data Retrieval Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan

More information

File Management. File Management

File Management. File Management File Management 1 File Management File management system consists of system utility programs that run as privileged applications Input to applications is by means of a file Output is saved in a file for

More information

Multiple Choice Questions(Computer)

Multiple Choice Questions(Computer) Multiple Choice Questions(Computer) 1. Which of the following is the product of data processing a. information b. data c. software program d. system 2. The process of putting data into a location is called

More information

HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND IGNORING SPELLING ERROR IN SEARCH KEY BASED ON DOUBLE METAPHONE ALGORITHM

HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND IGNORING SPELLING ERROR IN SEARCH KEY BASED ON DOUBLE METAPHONE ALGORITHM HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND IGNORING SPELLING ERROR IN SEARCH KEY BASED ON DOUBLE METAPHONE ALGORITHM Md. Palash Uddin 1, Ashfaque Ahmed 2, Md. Delowar Hossain

More information

Chapter 1 File Organization 1.0 OBJECTIVES 1.1 INTRODUCTION 1.2 STORAGE DEVICES CHARACTERISTICS

Chapter 1 File Organization 1.0 OBJECTIVES 1.1 INTRODUCTION 1.2 STORAGE DEVICES CHARACTERISTICS Chapter 1 File Organization 1.0 Objectives 1.1 Introduction 1.2 Storage Devices Characteristics 1.3 File Organization 1.3.1 Sequential Files 1.3.2 Indexing and Methods of Indexing 1.3.3 Hash Files 1.4

More information

BM307 File Organization

BM307 File Organization BM307 File Organization Gazi University Computer Engineering Department 9/24/2014 1 Index Sequential File Organization Binary Search Interpolation Search Self-Organizing Sequential Search Direct File Organization

More information

Lecture 1: Data Storage & Index

Lecture 1: Data Storage & Index Lecture 1: Data Storage & Index R&G Chapter 8-11 Concurrency control Query Execution and Optimization Relational Operators File & Access Methods Buffer Management Disk Space Management Recovery Manager

More information

Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved

Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a

More information

DATA PROCESSING FOR COMMUNICATION NETWORK MONITORING AND CONTROL

DATA PROCESSING FOR COMMUNICATION NETWORK MONITORING AND CONTROL DATA PROCESSING FOR COMMUNICATION NETWORK MONITORING AND CONTROL D. I. Caplan Surface Communications Division Radio Corporation of America Camden 2, New Jersey The long-haul communications network is the

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary

More information

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents

More information

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog. Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected

More information

How To Understand The History Of An Operating System

How To Understand The History Of An Operating System 7 Operating Systems 7.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 7.2 Understand the role of the operating system.

More information

COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A. PREREQUISITE: None. Concurrent enrollment in CIS-96 or CIS-97 is recommended.

COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A. PREREQUISITE: None. Concurrent enrollment in CIS-96 or CIS-97 is recommended. Degree Credit _X Non Credit Nondegree Credit Comm Service COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A COURSE DESCRIPTION 3 Units 1A Introduction to Computer Information Systems PREREQUISITE: None. Concurrent

More information

File-System Implementation

File-System Implementation File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation

More information

ENHANCEMENTS TO SQL SERVER COLUMN STORES. Anuhya Mallempati #2610771

ENHANCEMENTS TO SQL SERVER COLUMN STORES. Anuhya Mallempati #2610771 ENHANCEMENTS TO SQL SERVER COLUMN STORES Anuhya Mallempati #2610771 CONTENTS Abstract Introduction Column store indexes Batch mode processing Other Enhancements Conclusion ABSTRACT SQL server introduced

More information

Data storage Tree indexes

Data storage Tree indexes Data storage Tree indexes Rasmus Pagh February 7 lecture 1 Access paths For many database queries and updates, only a small fraction of the data needs to be accessed. Extreme examples are looking or updating

More information

Streaming Lossless Data Compression Algorithm (SLDC)

Streaming Lossless Data Compression Algorithm (SLDC) Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch

More information

Software: Systems and Application Software

Software: Systems and Application Software Software: Systems and Application Software Computer Software Operating System Popular Operating Systems Language Translators Utility Programs Applications Programs Types of Application Software Personal

More information

1.1 Electronic Computers Then and Now

1.1 Electronic Computers Then and Now 1.1 Electronic Computers Then and Now The first electronic computer was built in the late 1930s by Dr.John Atanasoff and Clifford Berry at Iowa State University in USA. They designed their computer to

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

A Deduplication-based Data Archiving System

A Deduplication-based Data Archiving System 2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System

More information

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Revised 5/2010 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Course Description Covers computer concepts and Internet skills and uses a software

More information

THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM

THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

Storage Management for Files of Dynamic Records

Storage Management for Files of Dynamic Records Storage Management for Files of Dynamic Records Justin Zobel Department of Computer Science, RMIT, GPO Box 2476V, Melbourne 3001, Australia. jz@cs.rmit.edu.au Alistair Moffat Department of Computer Science

More information

COMPUTER HARDWARE. Input- Output and Communication Memory Systems

COMPUTER HARDWARE. Input- Output and Communication Memory Systems COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)

More information

Overview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16

Overview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16 HNC Computing - s HNC Computing - s Physical Overview Process What techniques are available for physical design? Physical Explain one physical design technique. Modern Management McFadden/Hoffer Chapter

More information

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers. Chapter 1 CD-ROM stands for: a. Compact Disk Random Only Memory b. Compact Disk Read Only Memory c. Computer Device Read Only Memory d. Computer Disk Random Online Memory Control Unit (CU) is the a. Main

More information

The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform

The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform Fong-Hao Liu, Ya-Ruei Liou, Hsiang-Fu Lo, Ko-Chin Chang, and Wei-Tsong Lee Abstract Virtualization platform solutions

More information

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?

More information

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè. CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection

More information

Introduction. What is an Operating System?

Introduction. What is an Operating System? Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization

More information

How To Backup A Database In Navision

How To Backup A Database In Navision Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft

More information

Fast Arithmetic Coding (FastAC) Implementations

Fast Arithmetic Coding (FastAC) Implementations Fast Arithmetic Coding (FastAC) Implementations Amir Said 1 Introduction This document describes our fast implementations of arithmetic coding, which achieve optimal compression and higher throughput by

More information

Section 1.4 Place Value Systems of Numeration in Other Bases

Section 1.4 Place Value Systems of Numeration in Other Bases Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason

More information

10CS35: Data Structures Using C

10CS35: Data Structures Using C CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a

More information

Database 2 Lecture I. Alessandro Artale

Database 2 Lecture I. Alessandro Artale Free University of Bolzano Database 2. Lecture I, 2003/2004 A.Artale (1) Database 2 Lecture I Alessandro Artale Faculty of Computer Science Free University of Bolzano Room: 221 artale@inf.unibz.it http://www.inf.unibz.it/

More information

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California

More information

Recording Supervisor Manual Presence Software

Recording Supervisor Manual Presence Software Presence Software Version 9.2 Date: 09/2014 2 Contents... 3 1. Introduction... 4 2. Installation and configuration... 5 3. Presence Recording architectures Operating modes... 5 Integrated... with Presence

More information

File System Management

File System Management Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation

More information

REMOTE REAL -TIME PROCESS AND PRODUCTION MONITORING MECHANISM OF LIGHTING PARTS

REMOTE REAL -TIME PROCESS AND PRODUCTION MONITORING MECHANISM OF LIGHTING PARTS REMOTE REAL -TIME PROCESS AND PRODUCTION MONITORING MECHANISM OF LIGHTING PARTS FOR OUTDOOR RECREATION ABSTRACT Cheng-I Hou 1, Han-Chen Huang 2*, Tian-Syung Lan 1, Wei-Min Teng 1 1 Yu Da University of

More information

THE SOCIETY OF BUSINESS PRACTITIONERS

THE SOCIETY OF BUSINESS PRACTITIONERS THE SOCIETY OF BUSINESS PRACTITIONERS CERTIIFIICATE IIN BUSINESS ADMIINIISTRATI ION This is an introductory course to the fundamental principles of business studies. Students who have the necessary GCE

More information

Specifications of Paradox for Windows

Specifications of Paradox for Windows Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

MapReduce With Columnar Storage

MapReduce With Columnar Storage SEMINAR: COLUMNAR DATABASES 1 MapReduce With Columnar Storage Peitsa Lähteenmäki Abstract The MapReduce programming paradigm has achieved more popularity over the last few years as an option to distributed

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

MS Access: Advanced Tables and Queries. Lesson Notes Author: Pamela Schmidt

MS Access: Advanced Tables and Queries. Lesson Notes Author: Pamela Schmidt Lesson Notes Author: Pamela Schmidt Tables Text Fields (Default) Text or combinations of text and numbers, as well as numbers that don't require calculations, such as phone numbers. or the length set by

More information

WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math

WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit

More information

Performance evaluation of Web Information Retrieval Systems and its application to e-business

Performance evaluation of Web Information Retrieval Systems and its application to e-business Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts

More information

Principles of Database Management Systems. Overview. Principles of Data Layout. Topic for today. "Executive Summary": here.

Principles of Database Management Systems. Overview. Principles of Data Layout. Topic for today. Executive Summary: here. Topic for today Principles of Database Management Systems Pekka Kilpeläinen (after Stanford CS245 slide originals by Hector Garcia-Molina, Jeff Ullman and Jennifer Widom) How to represent data on disk

More information

MADR Algorithm to Recover Authenticity from Damage of the Important Data

MADR Algorithm to Recover Authenticity from Damage of the Important Data , pp. 443-452 http://dx.doi.org/10.14257/ijmue.2014.9.12.39 MADR Algorithm to Recover Authenticity from Damage of the Important Data Seong-Ho An 1, * Kihyo Nam 2, Mun-Kweon Jeong 2 and Yong-Rak Choi 1

More information

Benchmarking Cassandra on Violin

Benchmarking Cassandra on Violin Technical White Paper Report Technical Report Benchmarking Cassandra on Violin Accelerating Cassandra Performance and Reducing Read Latency With Violin Memory Flash-based Storage Arrays Version 1.0 Abstract

More information

HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2

HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India derahul@ieee.org 2 Bangalore University, India ABSTRACT

More information

Logic gates. Chapter. 9.1 Logic gates. MIL symbols. Learning Summary. In this chapter you will learn about: Logic gates

Logic gates. Chapter. 9.1 Logic gates. MIL symbols. Learning Summary. In this chapter you will learn about: Logic gates Chapter 9 Logic gates Learning Summary In this chapter you will learn about: Logic gates Truth tables Logic circuits/networks In this chapter we will look at how logic gates are used and how truth tables

More information

Database Fundamentals

Database Fundamentals Database Fundamentals Computer Science 105 Boston University David G. Sullivan, Ph.D. Bit = 0 or 1 Measuring Data: Bits and Bytes One byte is 8 bits. example: 01101100 Other common units: name approximate

More information

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel

More information