The response times are linear with the request sizes for flash-based Solid State Disk(SSD) with the same request type. Moreover, the read performance and write performance of flash-based SSD are asymmetric. Based on these characteristics, this paper proposes a Size-based I/O Scheduler(SIOS) for flash-based SSD to improve the I/O performance of SSD-based storage systems from the viewpoint of average response time. SIOS utilizes the asymmetric read and write performance characteristics of flash-based SSD and gives higher priority to the read requests. Moreover, by first processing the small requests in the I/O waiting queue, the average waiting times of the requests are reduced significantly. It implements SIOS in the Linux kernel and evaluates it with two kinds of SSD devices(SLC and MLC)driven by the five traces. Compared with the existing Linux disk I/O schedulers, evaluation results show that SIOS reduces average response times by 18.4%, 25.8%, 14.9%, 14.5% and 13.1% for SLC-based flash SSD, and reduces average response times by 16.9%, 24.4%, 13.1%, 13.0% and 13.7% for MLC-based flash SSD. Results show that compared with the state-of-the-arts, SIOS reduces the average response times significantly. Consequently, the I/O performance of the SSD-based storage systems is improved.
To overcome the shortcomings by the existing wideband spectrum compressed sensing by single cognitive node: low effici- ency and high load in low Signal Noise Ratio(SNR) and deep fading, the algorithm based on reweighted fast alternating direction-n multiplier method for spectrum sensing is proposed. This algorithm can make the update of auxiliary variable simplified through derivation by utilizing convexity of the objective function. As for the update of estimated variables, it makes augmented Lagrangian functions with partial linearization become strictly convex function by linearization of objective function and adding a quadratic term, ultimately solving problems by using iterative soft threshold algorithm. Meanwhile, it adds weight in the target term and suppressing non-zero elements in signal with large weight to get the solution close to minimum ?0 norm. Experimental results show that detection probability and detection speed of the algorithm is improved under the environment of low SNR.
It is limitary to classify the radio devices by utilizing the turn-on transients character, when the turn-on transient signals are captured and extracted. Aiming at this problem, this paper investigates Frequency Hopping(FH) transients character which can be used to classify the bluetooth devices alike the Turn-on Transients(TOT) character but get rid of the limitation which the RFF based TOT character has. The FHT-Character based on the Radio Frequency Fingerprinting(RFF) process is validated, which includes data acquisition, transient detection, radio frequency fingerprint extraction, and classification subsystems. A classification performance of the identification system is evaluated from experimental data. It is demonstrated that the FHT character can be used to classify the bluetooth devices successfully. It further analyzes the implications of device fingerprinting on the security of bluetooth networking protocols which is illustrated by the example of the detection and combat for wormhole attacks. From this, a safe link management protocol is given which is based on bluetooth fingerprinting.
There are some security problem of cognition difficulty, lack of global cognition and interaction in modern Internet security. How to identify network attacks and abnormal events in a quicker and more effective way is a key and eternal topic. The visualization method, a possible and valuable solution, is proposed. Considering the features and defeats of current working visualization systems, this paper researches and constructs a new type of Intrusion Detection System(IDS)——IDS View, a system based on radial panel visualization technology. With a main focus on user interface and experience, decrease of image occlusion, color mixing algorithms, curve algorithms and port mapping algorithms, this system can well be applied to the campus network security situation assessment. Application results show that analysts can intuitively be aware of the network security status from both macro and micro levels, so it can effectively identify network attacks and assist them in decision-making.
High reliability is an important characteristic of Next Generation Internet(NGI). The Internet is on the way to trusted network. The trusted network includes the trust of service providers, the trust of the network information transmission and the trust of end-users. The identity trust of service providers is the important base of the trusted network. Aiming at this problem, this paper describes a technical architecture of a website trusted service and explains the Domain Name Server(DNS)-based check protocol in details. By the check service, users can get the Internet service provider’s information conveniently from Internet applications. Experimental results show that this architecture and the related check protocol can meet the needs of the practical application in terms of efficiency, usability, scalability, etc. The check performance of one machine can reach 150 000 times per second.
Due to the simplistic and shallow application mode, syntactic information can not effectively play a role in the trigger recognition phase of traditional biological event extraction methods based on semantic and syntactic information. This paper describes a trigger extraction method based on the deep syntactic analysis. To make more effective utilization of the deep syntactic information, a unique indirect application mode is adopted. Deep syntactic information is used for edge detection, and the result is merged into the trigger extraction phase. Experimental results on BioNLP 2009 and 2011 shared tasks data achieve F-scores of 68.8% and 67.3%, which shows that the method has a good performance on biomedical event trigger extraction.