Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
Nowadays, significant attention has been paid to the flash memory-based Solid State Disk (SSD). Different from traditional disks, SSD uses semiconductor chips for storing the data. This structure enjoys original technical characteristics including low power consumption, shock resistance and high per...
| Main Author: | Alsalibi, Ahmed I N |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/45327/ |
| Abstract | Abstract here |
Similar Items
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
by: Eessa, Mohammed F.
Published: (2015)
by: Eessa, Mohammed F.
Published: (2015)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Pharmacoepidemiological Aspects
Of Oral Contraceptives
From A Family Planning Clinic
In Penang
by: N Nagalingam, Ambigadevy
Published: (1995)
by: N Nagalingam, Ambigadevy
Published: (1995)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
by: Irani, Arash Azim Zadeh
Published: (2013)
by: Irani, Arash Azim Zadeh
Published: (2013)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Game Theoretic Spatial Evacuation Simulation Models To Predict Crowd Disaster
by: Ibrahim, Azhar Mohd
Published: (2018)
by: Ibrahim, Azhar Mohd
Published: (2018)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
by: Anwar, Khairul
Published: (2018)
by: Anwar, Khairul
Published: (2018)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Multi Criteria Decision Making Approach For Product Aspect Extraction And Ranking In Aspect-Based Sentiment Analysis
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Similar Items
-
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025) -
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012) -
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
by: Eessa, Mohammed F.
Published: (2015) -
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
