The complexity of the data retrieval process using the proposed index extension

M Kvet, J Papan - IEEE Access, 2022 - ieeexplore.ieee.org
Data retrieval, access, and tuple identification are inevitable in database processing,
ensuring performance. The entities and relationships form a relational database. Data …

VMMISD: An Efficient Load Balancing Model for Virtual Machine Migrations via Fused Metaheuristics With Iterative Security Measures and Deep Learning …

MG Brahmam, RV Anand - IEEE Access, 2024 - ieeexplore.ieee.org
As cloud computing continues to evolve, the need for efficient and secure management of
virtual machine (VM) migrations has become increasingly evident. Traditional models often …

Enhancing Analytical Select Statements Using Reference Aliases

M Kvet, J Papan - IEEE Access, 2024 - ieeexplore.ieee.org
Data analytics is an inseparable part of the current information systems. Various tools can
provide the analysis and produce results in any graphical form, enclosed by the complex …

Dataset Similarity Detection for Global Deduplication in the DD File System

T Wong, S Thakkar, KF Hsieh, Z Tom… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
Deduplication has become a widely used technique to reduce space requirements for
storage systems by replacing redundant chunks of data with references. While storage …

RTFTL: design and implementation of real-time FTL algorithm for flash memory

Q He, G Bian, W Zhang, Z Li - The Journal of Supercomputing, 2022 - Springer
The optimization of traditional FTL (Flash Translation Layer) algorithm is mainly aimed at the
average response time of flash memory read and write operation on a flash chip, because of …

Research on Global BloomFilter-Based Data Routing Strategy of Deduplication in Cloud Environment

Q He, Z Li, C Chen, H Feng - IETE Journal of Research, 2023 - Taylor & Francis
The application of data deduplication technology reduces the demand for data storage and
improves resource utilization. Compared with limited storage capacity and computing …

Energy-Efficient Architecture for Optimized IoT Data Transmission from Edge to Cloud

M Zeba, M Mashira, MMJ Mim, MM Islam, MR Hassan… - 2024 - researchsquare.com
Abstract Edge Computing and the Internet of Things (IoT) have recently experienced
significant growth and transformed how data is processed and analyzed. Edge computing …

Research on Transparent Access Technology of Data Resources Based on Blockchain

Z Xiongqing - … on Power, Electrical Engineering, Electronics and …, 2023 - ieeexplore.ieee.org
With the advent of the era of big data, data has become an intangible asset with great social
and economic value. Access control technology is an important means to limit the access …

[PDF][PDF] Concept of Select Unlocking Optimization

M Kvet - Transactions - ipsitransactions.org
Ensuring data integrity stored in a database requires change encapsulation in a transaction.
Transaction maintains consistency by shifting the database from one consistent state to …