19,804 research outputs found

    A Running Time Improvement for Two Thresholds Two Divisors Algorithm

    Get PDF
    Chunking algorithms play an important role in data de-duplication systems. The Basic Sliding Window (BSW) algorithm is the first prototype of the content-based chunking algorithm which can handle most types of data. The Two Thresholds Two Divisors (TTTD) algorithm was proposed to improve the BSW algorithm in terms of controlling the variations of the chunk-size. In this project, we investigate and compare the BSW algorithm and TTTD algorithm from different factors by a series of systematic experiments. Up to now, no paper conducts these experimental evaluations for these two algorithms. This is the first value of this paper. According to our analyses and the results of experiments, we provide a running time improvement for the TTTD algorithm. Our new solution reduces about 7 % of the total running time and also reduces about 50 % of the large-sized chunks while comparing with the original TTTD algorithm and make average chunk-size closer to the expected chunk-size. These significant results are the second important value of this project

    A Survey on Data Deduplication

    Get PDF
    Now-a-days, the demand of data storage capacity is increasing drastically. Due to more demands of storage, the computer society is attracting toward cloud storage. Security of data and cost factors are important challenges in cloud storage. A duplicate file not only waste the storage, it also increases the access time. So the detection and removal of duplicate data is an essential task. Data deduplication, an efficient approach to data reduction, has gained increasing attention and popularity in large-scale storage systems. It eliminates redundant data at the file or subfile level and identifies duplicate content by its cryptographically secure hash signature. It is very tricky because neither duplicate files don?t have a common key nor they contain error. There are several approaches to identify and remove redundant data at file and chunk levels. In this paper, the background and key features of data deduplication is covered, then summarize and classify the data deduplication process according to the key workflow

    ARCPS - Anti-Redundant Cloud & Public Storage Moving towards Intelligent Cloud

    Get PDF
    Clouds are the future and powerful source in almost every aspect of computing. They offer many services running to facilitate users at same time. Cloud infrastructure is made up with a number of resourceful systems connected each other and to the internet. This paper is about (STaaS) Storage as a service but we are looking as a cloud storage provider, how to improve user experience and cloud storage efficiency by de-duplication of data. Cloud storage is unlimited but practically everything has a limit, so storage is also limited but the data storage demand is increasing with every next day. Everyone wants reliable and secure storage to store all of his data. Storage space is a need for everyone, and it’s mostly beneficial to those people who want a shared space or they want to share data online with others with minimal efforts. So, this paper describes a technique in which cloud providers can save a lot of storage space by eradicating duplication and this will be an automatic and runtime process. By monitoring and analyzing the semantics of data through different channels like DBpedia, WordNet etc. Data will be categorized accordingly and among these categories, checking of duplication performed and removed if found. Different file formats can have different techniques for processing. We are mainly focusing on the public cloud

    Effect of Poor Access to Water and Sanitation As Risk Factors for Soil-Transmitted Helminth Infection: Selectiveness by the Infective Route

    Get PDF
    Background: Soil-transmitted helminth (STH) infections are a public health problem in resource-limited settings worldwide. Chronic STH infection impairs optimum learning and productivity, contributing to the perpetuation of the poverty-disease cycle. Regular massive drug administration (MDA) is the cardinal recommendation for its control; along with water, sanitation and hygiene (WASH) interventions. The impact of joint WASH interventions on STH infections has been reported; studies on the independent effect of WASH components are needed to contribute with the improvement of current recommendations for the control of STH. The aim of this study is to assess the association of lacking access to water and sanitation with STH infections, taking into account the differences in route of infection among species and the availability of adequate water and sanitation at home. Methods and Findings: Cross-sectional study, conducted in Salta province, Argentina. During a deworming program that enrolled 6957 individuals; 771 were randomly selected for stool/serum sampling for parasitological and serological diagnosis of STH. Bivariate stratified analysis was performed to explore significant correlations between risk factors and STH infections grouped by mechanism of entry as skin-penetrators (hookworms and Strongyloides stercoralis) vs. orally-ingested (Ascaris lumbricoides and Trichuris trichiura). After controlling for potential confounders, unimproved sanitation was significantly associated with increased odds of infection of skin-penetrators (adjusted odds ratio [aOR] = 3.9; 95% CI: 2.6–5.9). Unimproved drinking water was significantly associated with increased odds of infection of orally-ingested (aOR = 2.2; 95% CI: 1.3–3.7). Conclusions: Lack of safe water and proper sanitation pose a risk of STH infections that is distinct according to the route of entry to the human host used by each of the STH species. Interventions aimed to improve water and sanitation access should be highlighted in the recommendations for the control of STH.Fil: Echazú, Adriana. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Bonanno, Daniela. Ministerio de Salud de la Nación. Dirección Nacional de Prevención de Enfermedades y Riesgos; ArgentinaFil: Juarez, Marisa. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; Argentina. Fundación Mundo Sano; ArgentinaFil: Cajal, Silvana P.. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; ArgentinaFil: Heredia, Viviana. Provincia de Salta. Hospital Zonal Juan Domingo Perón ; ArgentinaFil: Caropresi, Silvia. Provincia de Salta. Hospital Zonal Juan Domingo Perón ; ArgentinaFil: Cimino, Rubén Oscar. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Caro, Nicolas. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; ArgentinaFil: Vargas Flores, Paola Andrea. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Paredes, Gladys. Provincia de Salta. Hospital Zonal Juan Domingo Perón ; ArgentinaFil: Krolewiecki, Alejandro Javier. Universidad Nacional del Litoral. Facultad de Ciencias Económicas. Instituto de Investigación Estado, Territorio y Economía; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentin

    ILO Minimum Estimate of Forced Labour in the World

    Get PDF
    Prepared for the ILO by Patrick Belser, Michaelle de Cock, and Farhad Mehran, this is a technical document that provides a detailed account of the methodology used in the ILO’s first minimum estimate of forced labour in the world, prepared in 2005. It also includes a thorough evaluation of the results, with calculation of margins of error and comparison with external sources

    Towards Tractable Algebras for Bags

    Get PDF
    AbstractBags, i.e., sets with duplicates, are often used to implement relations in database systems. In this paper, we study the expressive power of algebras for manipulating bags. The algebra we present is a simple extension of the nested relation algebra. Our aim is to investigate how the use of bags in the language extends its expressive power and increases its complexity. We consider two main issues, namely (i) the impact of the depth of bag nesting on the expressive power and (ii) the complexity and the expressive power induced by the algebraic operations. We show that the bag algebra is more expressive than the nested relation algebra (at all levels of nesting), and that the difference may be subtle. We establish a hierarchy based on the structure of algebra expressions. This hierarchy is shown to be highly related to the properties of the powerset operator
    • …
    corecore