A novel method of dynamic permanent caching with resourceful built up and imperative access
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Caching is built up each time when the machine starts up according to user’s application usability. This built up rocedure escalates the efficiency of application’s usage for the next coming access of same application. This cache history is vanished when power is switched off. Most of the time, a user uses the same common applications in his/her daily routine, articularly during the working hours. Moreover, against every ew start up, the user bears the penalty of cache rebuilt to achieve better and efficient access because on first time access, the application is opened without caching which results more time to open rather than the second time after the cache has already built up. This paper proposes a novel idea of intelligent and permanent caching which can build up dynamically and can be stored permanently in one part of cache chip according to user’s application usability. This paper describes an algorithm that how CPU can build a dynamic and intelligent Electrically Editable Permanent Cache (EEPC) according to the probability of user’s application usage in a computer machine. For proposed EEPC, we implement a Probability Calculation Table (PCT) by reusing available compression techniques and through introducing some basic change in cache storage policy. On the other hand L1 and L2 implementation is also the part of this study; for example, History Table (HT) is maintained for L1 and L1 is physically addressed to the main memory. Whereas, L2 is virtually addressed with the main memory and fully associative to handle misses. We mainly focus on Cache design enhancement, improvement in cache speed and implementation issues.
Authors and Affiliations
Ijaz Ali Shoukat , Mohsin Iftikhar
Audio Watermarking Based On The PSK Modulation
Audio watermarking is a technique, which can be used to embed information into the digital representation of audio signals. The main challenge is to hide data representing some information without compromising the qualit...
A Highly Effective and Efficient Route Discovery & Maintenance in DSR
Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly err...
An Efficient Pruning Technique for Mining Frequent Itemsets in Spatial Databases
Frequent Itemset Mining is evaluating the rules and relationship within the data items are optimizing it, in the large spatial databases (for e.g. Images, Docs, AVI files etc).It is one of the major problems in DM (Data...
Centrality measures with a new index called E-User (Effective User) Index for determiningthe most effective user in Twitter Online Social Network
In this study, we considered the issue of determination of the most effective user in the twitter online social network. We worked on asocial network graph which have relationships (edges) between users who posteda tweet...
Enhancing the Communication Channel Through Secure Shell And Irrational DES
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry...