Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Data-Oriented Operating System for Big Data and Cloud

    Selwyn Darryl Kessler, Kok-Why Ng*, Su-Cheng Haw*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 633-647, 2024, DOI:10.32604/iasc.2024.054154

    Abstract Operating System (OS) is a critical piece of software that manages a computer’s hardware and resources, acting as the intermediary between the computer and the user. The existing OS is not designed for Big Data and Cloud Computing, resulting in data processing and management inefficiency. This paper proposes a simplified and improved kernel on an x86 system designed for Big Data and Cloud Computing purposes. The proposed algorithm utilizes the performance benefits from the improved Input/Output (I/O) performance. The performance engineering runs the data-oriented design on traditional data management to improve data processing speed by… More >

  • Open Access

    ARTICLE

    An Efficient Memory Management for Mobile Operating Systems Based on Prediction of Relaunch Distance

    Jaehwan Lee1, Sangoh Park2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 171-186, 2023, DOI:10.32604/csse.2023.038139

    Abstract Recently, various mobile apps have included more features to improve user convenience. Mobile operating systems load as many apps into memory for faster app launching and execution. The least recently used (LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low. However, the LRU-based cached app termination does not distinguish between frequently or infrequently used apps. The app launch performance degrades if LRU terminates frequently used apps. Recent studies have suggested the potential of using users’ app usage patterns to predict the next app launch… More >

  • Open Access

    ARTICLE

    SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases

    Kyungmin Sim, Jeong Hyun Yi, Haehyun Cho*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.036695

    Abstract Despite the advances in automated vulnerability detection approaches, security vulnerabilities caused by design flaws in software systems are continuously appearing in real-world systems. Such security design flaws can bring unrestricted and misimplemented behaviors of a system and can lead to fatal vulnerabilities such as remote code execution or sensitive data leakage. Therefore, it is an essential task to discover unrestricted and misimplemented behaviors of a system. However, it is a daunting task for security experts to discover such vulnerabilities in advance because it is time-consuming and error-prone to analyze the whole code in detail. Also,… More >

  • Open Access

    ARTICLE

    Key-Value Store Coupled with an Operating System for Storing Large-Scale Values

    Jeonghwan Im1, Hyuk-Yoon Kwon2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3333-3350, 2022, DOI:10.32604/cmc.2022.029566

    Abstract The key-value store can provide flexibility of data types because it does not need to specify the data types to be stored in advance and can store any types of data as the value of the key-value pair. Various types of studies have been conducted to improve the performance of the key-value store while maintaining its flexibility. However, the research efforts storing the large-scale values such as multimedia data files (e.g., images or videos) in the key-value store were limited. In this study, we propose a new key-value store, WR-Store++ aiming to store the large-scale… More >

  • Open Access

    ARTICLE

    Relative Time Quantum-based Enhancements in Round Robin Scheduling

    Sardar Zafar Iqbal, Hina Gull*, Saqib Saeed, Madeeha Saqib, Mohammed Alqahtani, Yasser A. Bamarouf, Gomathi Krishna, May Issa Aldossary

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 461-477, 2022, DOI:10.32604/csse.2022.017003

    Abstract Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system. Operating systems need to be upgraded to match the needs of modern-day systems relying on Internet of Things, Fog computing and Mobile based applications. The scheduling algorithm of the operating system dictates that how the resources will be allocated to the processes and the Round Robin algorithm (RR) has been widely used for it. The intent of this study is to ameliorate RR scheduling algorithm to optimize task scheduling. We More >

  • Open Access

    ARTICLE

    A Lightweight Approach to Access to Wireless Network without Operating System Support

    Yonghua Xionga,b,d, Jinhua Shea,b,c, Keyuan Jiangd

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 275-284, 2018, DOI:10.1080/10798587.2017.1280262

    Abstract Wireless network is crucial for the Mobile Transparent Computing (MTC), in which a mobile device without any Operating System (OS) support needs to load the demanded OSes and applications through accessing the wireless network connection. In this paper, a lightweight approach based on the Boot Management System (BMS) was proposed to ensure the wireless network connection before booting OS. In BMS, the Virtual File System (VFS) technology was used to drive the wireless network card and establish a stable network connection. A prototype of the BMS was tested on ARM11 hardware platform and the results More >

Displaying 1-10 on page 1 of 6. Per Page