DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2495
  • Access Fee: ₦5,000 ($14)
  • Pages: 52 Pages
  • Format: Microsoft Word
  • Views: 583
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
We analyze a class of randomized Least-Recently-Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf’s law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, a requested document that is not found in the cache either replaces a necessary number of least recently used documents with probability depending on its size or the cache is left unchanged. In this framework, we provide explicit asymptotic characterization of the cache fault probability. Using the derived result we prove that the asymptotic performance of this class of algorithms is optimized when the randomization probabilities are chosen inversely proportional to document sizes. In addition, for this optimized and easy to implement policy, we show that its performance is within a constant factor from the optimal static algorithm. An excellent agreement between our approximation and simulation experiments, even for small cache sizes, further validates our asymptotic results 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION 
ACKNOWLEDGEMENT 
ORGANIZATION OF WORK
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE 
1.0INTRODUCTION 
1.1STATEMENT OF THE PROBLEM 
1.2PURPOSE OF THE STUDY
1.3AIM AND OBJECTIVES 
1.4SCOPE OF STUDY
1.5CONSTRAINTS 
1.6ASSUMPTION
1.7DEFINITION OF TERMS

CHAPTER TWO
2.0LITERATURE REVIEW

CHAPTER THREE
3.0DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM 
3.1FACT FINDING METHODS USED 
3.11REFERENCES TO WRITTEN DOCUMENT
3.1.2BROWSING OF INTERNET
3.2INPUT, PROCESS, OUTPUT ANALYSIS
3.2.1INPUT, ANALYSIS
3.2.2INPUT FORMAT
3.2.3PROCESS,  ANALYSIS
3.2.4OUTPUT, ANALYSIS
3.2.5INPUT FORMAT
3.3PROBLEM OF THE EXISTING SYSTEM
3.4OBJECTIVE OF THE EXISTING SYSTEM
3.5JUSTIFICATION OF THE NEW EXISTING SYSTEM

CHAPTER FOUR 
4.0THE DESIGN OF THE NEW SYSTEM 
4.1OUTPUT SPECIFICATION AND DESIGN
4.2INPUT SPECIFICATION  AND DESIGN
4.3FILE DESIGN
4.4FILE STRUCTURE
4.5PROCEDURE CHART
4.6SYSTEM FLOWCHART
4.7SYSTEM REQUIREMENT
4.71HARDWARE REQUIREMENT
4.72SOFT WARE REQUIREMENT
5.0IMPLEMENTATION 
5.1PROGRAM DESIGN
5.2PSEUDO CODE
5.3PROGRAM FLOWCHART
6.0DOCUMENTATION
6.1CHOICE OF LANGUAGE
6.2LANGUAGE INTRODUCTION
6.3CHANGE OVER METHOD
7.0CHAPTER FIVE
8.0CONCLUSION
7.1RECOMMENDATION
BIBLIOGRAPHY 

DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2495
  • Access Fee: ₦5,000 ($14)
  • Pages: 52 Pages
  • Format: Microsoft Word
  • Views: 583
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2495
    Fee ₦5,000 ($14)
    No of Pages 52 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology... Continue Reading
    ABSTRACT On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology... Continue Reading
    ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the... Continue Reading
    ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the... Continue Reading
    Abstract  This study was designed to determine comparative effect of computer tutorial and simulation techniques on achievement, interest and retention of automechanics students in technical colleges in Lagos state. The study was a pretest, posttest, non-equivalent control group quasiexperiment which involved groups of students in their intact... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described. A supervisory minicomputer can handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm. The... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described. A supervisory minicomputer can handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm. The microcomputer monitors arm joint positions and sensors, and maintains... Continue Reading
    ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
    ABSTRACT A system to control a hydraulic industrial arm using a4- bit microcomputer is described.  A supervisory minicomputer can  handle global routines such as science analysis and task and trajectory planning while the microcomputer attends to the control of the arm.  The microcomputer monitors arm joint positions and sensors, and maintains... Continue Reading
    ABSTRACT This project work is an attempt to control the speedof the vehicle designed with computer software to enable thethird party or owner to get the location, speed and activity of thedriver. To achieve this, the system can transmit the informationin real time. The use of GSM/GPRS technologies allows thesystem to track the objects and provide... Continue Reading
    Call Us
    whatsappWhatsApp Us