+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT

  • Type:Project
  • Pages:52
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)
ABSTRACT
We analyze a class of randomized Least-Recently-Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf’s law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, a requested document that is not found in the cache either replaces a necessary number of least recently used documents with probability depending on its size or the cache is left unchanged. In this framework, we provide explicit asymptotic characterization of the cache fault probability. Using the derived result we prove that the asymptotic performance of this class of algorithms is optimized when the randomization probabilities are chosen inversely proportional to document sizes. In addition, for this optimized and easy to implement policy, we show that its performance is within a constant factor from the optimal static algorithm. An excellent agreement between our approximation and simulation experiments, even for small cache sizes, further validates our asymptotic results 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION 
ACKNOWLEDGEMENT 
ORGANIZATION OF WORK
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE 
1.0 INTRODUCTION 
1.1 STATEMENT OF THE PROBLEM 
1.2 PURPOSE OF THE STUDY
1.3 AIM AND OBJECTIVES 
1.4 SCOPE OF STUDY
1.5 CONSTRAINTS 
1.6 ASSUMPTION
1.7 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM 
3.1 FACT FINDING METHODS USED 
3.11 REFERENCES TO WRITTEN DOCUMENT
3.1.2 BROWSING OF INTERNET
3.2 INPUT, PROCESS, OUTPUT ANALYSIS
3.2.1 INPUT, ANALYSIS
3.2.2 INPUT FORMAT
3.2.3 PROCESS,  ANALYSIS
3.2.4 OUTPUT, ANALYSIS
3.2.5 INPUT FORMAT
3.3 PROBLEM OF THE EXISTING SYSTEM
3.4 OBJECTIVE OF THE EXISTING SYSTEM
3.5 JUSTIFICATION OF THE NEW EXISTING SYSTEM

CHAPTER FOUR 
4.0 THE DESIGN OF THE NEW SYSTEM 
4.1 OUTPUT SPECIFICATION AND DESIGN
4.2 INPUT SPECIFICATION  AND DESIGN
4.3 FILE DESIGN
4.4 FILE STRUCTURE
4.5 PROCEDURE CHART
4.6 SYSTEM FLOWCHART
4.7 SYSTEM REQUIREMENT
4.71 HARDWARE REQUIREMENT
4.72 SOFT WARE REQUIREMENT
5.0 IMPLEMENTATION 
5.1 PROGRAM DESIGN
5.2 PSEUDO CODE
5.3 PROGRAM FLOWCHART
6.0 DOCUMENTATION
6.1 CHOICE OF LANGUAGE
6.2 LANGUAGE INTRODUCTION
6.3 CHANGE OVER METHOD
7.0 CHAPTER FIVE
8.0 CONCLUSION
7.1 RECOMMENDATION
BIBLIOGRAPHY 

DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT

Share This

Details

Type Project
Department Computer Science
Project ID CPU1430
Price ₦3,000 ($20)
No of Pages 52 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1430
    Price ₦3,000 ($20)
    No of Pages 52 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology... Continue Reading
    ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the... Continue Reading
    ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described. A supervisory minicomputer can handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm. The... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described. A supervisory minicomputer can handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm. The microcomputer monitors arm joint positions and sensors, and maintains... Continue Reading
    ABSTRACT This project work is an attempt to control the speedof the vehicle designed with computer software to enable thethird party or owner to get the location, speed and activity of thedriver. To achieve this, the system can transmit the informationin real time. The use of GSM/GPRS technologies allows thesystem to track the objects and provide... Continue Reading
    ORGANIZATION OF WORK This project has seven chapters. Each chapter deals with the chapter one. This chapter introduces the statement of the problem purpose of this study. The aims and objectives of the program. The scope, limitations and constraints, assumptions of program, and the... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described. A supervisory minicomputer can handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm. The microcomputer monitors arm joint positions and sensors, and maintains... Continue Reading
    ABSTRACT Steganography is an art of hiding sensitive data or some confidential information in some cover medium file. In this project, video steganography method has been implemented. As name suggest, video steganography means hiding any digital data in video files. The aim of this project is to hide, detect and retrieve the secret message hidden... Continue Reading
    ABSTRACT This work deals extensively with the design and construction of an electrodice display (EOD) with audio unit. The device displays the value of a ludo dice in numerical form and also produces sound as it displays the number. The device works with principle of chance employed by ludo game players. The output of the display is usually very... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us