SlideShare a Scribd company logo
A Novel Approach Of Caching 
Direct Mapping Using Cubic 
Approach 
Guidance 
Professor Chandrasegar .T 
Site,vit university Vellore 
Team Member 
Kamlesh Asati 11MCA0133 
Aakansha Soni 11MCA0080 
Harikesh Dwivedi 11MCA0083 
04SETMCAO056
Aim 
 A novel approach of caching direct mapping 
using cubic approach appreciate to improve 
system efficiency without losses the data. 
 It means that decrease the data access time 
with using sufficient memory but that’s not 
enough while we are implement these things 
with minimum time complexity and high 
level security. 
04SETMCAO056
Objective Scope 
 Increase the system performs. 
 Decrease the process execution time and find 
the method in which time complexity in this 
approach is minimum. 
 Try to produce accurate result without data 
losses. 
04SETMCAO056
Abstract 
 In the last few decades there is lot of research 
works carried out for the improvement of c p u. 
 Caching address mapping technique plays a 
vital role for the system improvement. 
 Based on the number of hits occurred on the 
caching leads to the effective utilization of 
processor. 
 in general when the caching memory size 
increases then the number of page faults 
/misses is going to get decreases between the 
processor and the system memory. 
 In this concept the proposed work is to deal with 
caching direct mapping and to secure the data in 
a random and cubic based combinatorial 
approach. 
04SETMCAO056
Introduction 
Cache Memory Mapping 
 The memory system has to quickly determine if a 
given address is in the cache. 
 Caching address mapping techniques plays a vital 
role for the system improvement. Based on the no 
of hits occurred on the caching leads to the 
effective utilization of processor. 
There are three popular methods 
1) Fully associative mapping 
2) Set associative mapping 
3) Direct mapping 
04SETMCAO056
Direct Mapping 
 This is the most popular technique for 
cache memory mapping. 
 If each block from main memory has only 
one place it can appear in the cache, the 
cache is said to be direct mapped. 
 Since a data block from ram can only be on 
space line in the cache , it must always 
replace the one block that was already 
there. 
04SETMCAO056
 Address Splits into two part address 
S w 
 Least significant w bits identify unique word 
in block. 
 Most significant s bits specify one memory 
block. 
 s bits divided into two parts tag line 
s 
a) Cache line address field r bits. 
b) Tag field of s-r most significant bit. 
S-r r 
04SETMCAO056
Cubic Approach 
 In cubic approach for Mapping we map the 
data in random and cubic base approach. 
 For this we use the formula of cubic equation. 
F(x)= ax3+bx2+cx+d 
04SETMCAO056
Existing System 
 In direct mapping, mapping is done with the linear approach. 
For this we use hashing concept, If data is consist of n integers 
and we have k number of cells then the address where in data 
stored or retrieved is the ordinary hash function is Hash = n%k 
H (k, i) = (h (k) + ci) modm 
 Think how linear mapping works then the answer is if the first 
location is not free, then it will go to the next location and 
check if the location is free or not, and so on until it finds 
empty blocks or can’t find at all. For retrieving the data, hash 
function and rehash function is used, retrieving is done by 
using the hash function to find the key and check if the data 
would coincide to the data needed. If not then rehash would 
be needed. Until such time the correct location is found or an 
empty space is encountered which shows the data does not 
exists. In linear approach the searching takes so much time 
because in linear mapping it searches in all blocks of memory 
therefore the speed is slow. 
04SETMCAO056
Literature Review 
According to Zhenghong Wang and Ruby B. Lee , 
Caches ideally should have low miss rates and short 
access times, and should be power efficient to system 
at the same time. 
 Sincerely finding on efficient hits based on 
information losses in caches have also moves the 
security issue for it. finally this concept shows that 
the cache architecture has low Miss Rates 
comparable to a highly associative cache and short 
access times and power efficiency close to that of a 
direct-mapped cache. 
 Additional benefits that the include cache 
architecture can bring, like fault method and hot-spot 
revolution techniques. 
04SETMCAO056
According to Mark D. Hill , cache is used to 
improve the system cost, which have large 
memory but using the cache memory we 
increase the access time of the system. 
Cache is small in size so it holds some data at a 
time .cache memory hold that data which are 
frequently used by the processor. For storing 
cache retained the recent referenced 
information. 
Caches are successful due to temporal and 
spatial locality. Temporal locality means future 
references are likely to be made to the same 
locations as recent references, while spatial 
locality suggests that future references are also 
likely to be made to locations near recent 
references. 
 Caches take advantage of temporal locality by 
retaining recently referenced Information. 
04SETMCAO056
Methodology 
Now we are trying to use our cubic approach to 
map the memory. The family of cubic equation is 
f(x) =ax3+bx2+cx+d.We use the function 
h(x) = (ax 3+bx 2+cx+d) mod y 
For finding the key element in cache memory .in 
this formula we take the value of x between 0 to 15 
and map the memory into cache between 0 to 15. 
For finding the solution we gives the value of x 
from 0 to 15 and change the values of a, b, c, d and 
calculate the function value y= ax3+bx2+cx+d and 
for the value of key element we calculate the value 
y modmheremis 16. 
04SETMCAO056
In this table we 
observe this cubic 
formula 
F(x)=(ax3+bx2+cx+) 
mody gives the 
value which is 
repeated in the 
column (ymod16),it 
means for that 
value of a,b,c,d 
it maps some 
memory address 
which is same.so 
this is not a 
correct mapping. 
X a b c d y Mod y 
0 2 3 3 1 1 1 
1 2 3 3 1 9 9 
2 2 3 3 1 35 3 
3 2 3 3 1 91 11 
4 2 3 3 1 189 13 
5 2 3 3 1 341 5 
6 2 3 3 1 559 15 
7 2 3 3 1 855 7 
8 2 3 3 1 1241 9 
9 2 3 3 1 1729 1 
10 2 3 3 1 2331 11 
11 2 3 3 1 3069 3 
12 2 3 3 1 3925 5 
13 2 3 3 1 4941 13 
14 2 3 3 1 6119 7 
04SETMCA56 15 2 3 3 1 7471 15
State diagram 
Start 
0,2,4,6,8 0,2,4,6,8 1,3,5,7,9 
1,3,5,7,9 
1,3,5,7,9 0,2,4,6,8 
0 to 9 
a 
Final/ 
hit 
b 
miss 
c d 
04SETMCAO056
 We notice that the function 
 F(x)= (ax3+bx2+cx+d)mod y 
 give unique value 
when we choose the value of a b & c such 
that a & b must be even and c must be odd 
but d consist any value between 0 to 9. 
above given state diagram shows how the 
function will work. 
04SETMCAO056
Result 
 Using this approach we decrease the time 
complexity of the direct mapping which is 
good and complexity is o(n) , its also help the 
decrease the process execution time. 
input(0-15) output(0-15) 
 The proposed work is to deal with caching and 
to secure the data in a random and cubic base 
approach. 
04SETMCAO056 
Cubic remapping 
system 
f(x) =ax3+bx2+cx+d
 So we are using the cubic approach which 
maps the function more speedily than linear. 
In linear approach power consumption is also 
high using this approach we can also reduce 
the power consumption. 
 Using cubic approach we get the time 
complexity is o(n) . 
04SETMCAO056
Consider this snapshot as sample 
output ... 
04SETMCAO056
Conclusion 
 A cache is to improve system cost performance by 
providing the capacity of the large, slow memory 
with an access time close to that of the small, fast 
cache. 
 This simple approach implements a form of by 
passing the different address value. 
We develop a cubic approach to evaluate the 
performance of the proposed direct mapped caching 
algorithm our method enhances the reuse behavior of 
the temporal data while improving the reuse of the no 
temporal data by cubic associativity. 
 From our experimental results, we see that our 
method is both fast and accurate. 
04SETMCAO056
Future Enhancement 
 Future reaches issue can give better solution 
for this system , provided it overcomes the 
problems like replacement strategy that can 
better adopt to user access pattern and improve 
the cache space utilization , security issue. 
04SETMCAO056
THANK 
YOU

More Related Content

What's hot

F044062933
F044062933F044062933
F044062933
IJERA Editor
 
50120130406039
5012013040603950120130406039
50120130406039
IAEME Publication
 
Approximate Thin Plate Spline Mappings
Approximate Thin Plate Spline MappingsApproximate Thin Plate Spline Mappings
Approximate Thin Plate Spline Mappings
Archzilon Eshun-Davies
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
tayseer Karam alshekly
 
Training and Inference for Deep Gaussian Processes
Training and Inference for Deep Gaussian ProcessesTraining and Inference for Deep Gaussian Processes
Training and Inference for Deep Gaussian Processes
Keyon Vafa
 
Doc 20180130-wa0002
Doc 20180130-wa0002Doc 20180130-wa0002
Doc 20180130-wa0002
HarithaRanasinghe
 
Os revision ques
Os revision quesOs revision ques
Os revision ques
John Jo
 
2.5D Clip-Surfaces for Technical Visualization
2.5D Clip-Surfaces for Technical Visualization2.5D Clip-Surfaces for Technical Visualization
2.5D Clip-Surfaces for Technical Visualization
Matthias Trapp
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefix
Sanjeev Gupta
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
VARUN KUMAR
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
Data comparation
Data comparationData comparation
Data comparation
Jay Choudhary
 
SPIRE2015-Improved Practical Compact Dynamic Tries
SPIRE2015-Improved Practical Compact Dynamic TriesSPIRE2015-Improved Practical Compact Dynamic Tries
SPIRE2015-Improved Practical Compact Dynamic Tries
Andreas Poyias
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
ijmsr
 
cdrw
cdrwcdrw
Geometry Batching Using Texture-Arrays
Geometry Batching Using Texture-ArraysGeometry Batching Using Texture-Arrays
Geometry Batching Using Texture-Arrays
Matthias Trapp
 
A Three-Point Directional Search Block Matching Algorithm
A Three-Point Directional Search Block Matching Algorithm A Three-Point Directional Search Block Matching Algorithm
A Three-Point Directional Search Block Matching Algorithm
Yayah Zakaria
 

What's hot (18)

F044062933
F044062933F044062933
F044062933
 
50120130406039
5012013040603950120130406039
50120130406039
 
Approximate Thin Plate Spline Mappings
Approximate Thin Plate Spline MappingsApproximate Thin Plate Spline Mappings
Approximate Thin Plate Spline Mappings
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
Training and Inference for Deep Gaussian Processes
Training and Inference for Deep Gaussian ProcessesTraining and Inference for Deep Gaussian Processes
Training and Inference for Deep Gaussian Processes
 
Doc 20180130-wa0002
Doc 20180130-wa0002Doc 20180130-wa0002
Doc 20180130-wa0002
 
Os revision ques
Os revision quesOs revision ques
Os revision ques
 
2.5D Clip-Surfaces for Technical Visualization
2.5D Clip-Surfaces for Technical Visualization2.5D Clip-Surfaces for Technical Visualization
2.5D Clip-Surfaces for Technical Visualization
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefix
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
Data comparation
Data comparationData comparation
Data comparation
 
SPIRE2015-Improved Practical Compact Dynamic Tries
SPIRE2015-Improved Practical Compact Dynamic TriesSPIRE2015-Improved Practical Compact Dynamic Tries
SPIRE2015-Improved Practical Compact Dynamic Tries
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
cdrw
cdrwcdrw
cdrw
 
Geometry Batching Using Texture-Arrays
Geometry Batching Using Texture-ArraysGeometry Batching Using Texture-Arrays
Geometry Batching Using Texture-Arrays
 
A Three-Point Directional Search Block Matching Algorithm
A Three-Point Directional Search Block Matching Algorithm A Three-Point Directional Search Block Matching Algorithm
A Three-Point Directional Search Block Matching Algorithm
 

Similar to A Novel Approach of Caching Direct Mapping using Cubic Approach

Research Statement
Research StatementResearch Statement
Research Statement
Yuan Tang
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
Alexander Decker
 
DSP IEEE paper
DSP IEEE paperDSP IEEE paper
DSP IEEE paper
prreiya
 
Continuous Architecting of Stream-Based Systems
Continuous Architecting of Stream-Based SystemsContinuous Architecting of Stream-Based Systems
Continuous Architecting of Stream-Based Systems
CHOOSE
 
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
Pooyan Jamshidi
 
A general weighted_fuzzy_clustering_algorithm
A general weighted_fuzzy_clustering_algorithmA general weighted_fuzzy_clustering_algorithm
A general weighted_fuzzy_clustering_algorithm
TA Minh Thuy
 
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower BoundsParallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Subhajit Sahu
 
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower BoundsParallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Subhajit Sahu
 
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
cscpconf
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
Poonam Debnath
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Derryck Lamptey, MPhil, CISSP
 
MyStataLab Assignment Help
MyStataLab Assignment HelpMyStataLab Assignment Help
MyStataLab Assignment Help
Statistics Assignment Help
 
Ssbse10.ppt
Ssbse10.pptSsbse10.ppt
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Modern processors
Modern processorsModern processors
Modern processors
gowrivageesan87
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
Richard Ashworth
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
csandit
 
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTIONDECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
cscpconf
 
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
PrajanSanjayK
 
New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...
IJDKP
 

Similar to A Novel Approach of Caching Direct Mapping using Cubic Approach (20)

Research Statement
Research StatementResearch Statement
Research Statement
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
 
DSP IEEE paper
DSP IEEE paperDSP IEEE paper
DSP IEEE paper
 
Continuous Architecting of Stream-Based Systems
Continuous Architecting of Stream-Based SystemsContinuous Architecting of Stream-Based Systems
Continuous Architecting of Stream-Based Systems
 
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
 
A general weighted_fuzzy_clustering_algorithm
A general weighted_fuzzy_clustering_algorithmA general weighted_fuzzy_clustering_algorithm
A general weighted_fuzzy_clustering_algorithm
 
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower BoundsParallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
 
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower BoundsParallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
Parallel Batch-Dynamic Graphs: Algorithms and Lower Bounds
 
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
 
MyStataLab Assignment Help
MyStataLab Assignment HelpMyStataLab Assignment Help
MyStataLab Assignment Help
 
Ssbse10.ppt
Ssbse10.pptSsbse10.ppt
Ssbse10.ppt
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Modern processors
Modern processorsModern processors
Modern processors
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTIONDECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
DECISION TREE CLUSTERING: A COLUMNSTORES TUPLE RECONSTRUCTION
 
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
 
New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...
 

Recently uploaded

Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 

Recently uploaded (20)

Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 

A Novel Approach of Caching Direct Mapping using Cubic Approach

  • 1. A Novel Approach Of Caching Direct Mapping Using Cubic Approach Guidance Professor Chandrasegar .T Site,vit university Vellore Team Member Kamlesh Asati 11MCA0133 Aakansha Soni 11MCA0080 Harikesh Dwivedi 11MCA0083 04SETMCAO056
  • 2. Aim  A novel approach of caching direct mapping using cubic approach appreciate to improve system efficiency without losses the data.  It means that decrease the data access time with using sufficient memory but that’s not enough while we are implement these things with minimum time complexity and high level security. 04SETMCAO056
  • 3. Objective Scope  Increase the system performs.  Decrease the process execution time and find the method in which time complexity in this approach is minimum.  Try to produce accurate result without data losses. 04SETMCAO056
  • 4. Abstract  In the last few decades there is lot of research works carried out for the improvement of c p u.  Caching address mapping technique plays a vital role for the system improvement.  Based on the number of hits occurred on the caching leads to the effective utilization of processor.  in general when the caching memory size increases then the number of page faults /misses is going to get decreases between the processor and the system memory.  In this concept the proposed work is to deal with caching direct mapping and to secure the data in a random and cubic based combinatorial approach. 04SETMCAO056
  • 5. Introduction Cache Memory Mapping  The memory system has to quickly determine if a given address is in the cache.  Caching address mapping techniques plays a vital role for the system improvement. Based on the no of hits occurred on the caching leads to the effective utilization of processor. There are three popular methods 1) Fully associative mapping 2) Set associative mapping 3) Direct mapping 04SETMCAO056
  • 6. Direct Mapping  This is the most popular technique for cache memory mapping.  If each block from main memory has only one place it can appear in the cache, the cache is said to be direct mapped.  Since a data block from ram can only be on space line in the cache , it must always replace the one block that was already there. 04SETMCAO056
  • 7.  Address Splits into two part address S w  Least significant w bits identify unique word in block.  Most significant s bits specify one memory block.  s bits divided into two parts tag line s a) Cache line address field r bits. b) Tag field of s-r most significant bit. S-r r 04SETMCAO056
  • 8. Cubic Approach  In cubic approach for Mapping we map the data in random and cubic base approach.  For this we use the formula of cubic equation. F(x)= ax3+bx2+cx+d 04SETMCAO056
  • 9. Existing System  In direct mapping, mapping is done with the linear approach. For this we use hashing concept, If data is consist of n integers and we have k number of cells then the address where in data stored or retrieved is the ordinary hash function is Hash = n%k H (k, i) = (h (k) + ci) modm  Think how linear mapping works then the answer is if the first location is not free, then it will go to the next location and check if the location is free or not, and so on until it finds empty blocks or can’t find at all. For retrieving the data, hash function and rehash function is used, retrieving is done by using the hash function to find the key and check if the data would coincide to the data needed. If not then rehash would be needed. Until such time the correct location is found or an empty space is encountered which shows the data does not exists. In linear approach the searching takes so much time because in linear mapping it searches in all blocks of memory therefore the speed is slow. 04SETMCAO056
  • 10. Literature Review According to Zhenghong Wang and Ruby B. Lee , Caches ideally should have low miss rates and short access times, and should be power efficient to system at the same time.  Sincerely finding on efficient hits based on information losses in caches have also moves the security issue for it. finally this concept shows that the cache architecture has low Miss Rates comparable to a highly associative cache and short access times and power efficiency close to that of a direct-mapped cache.  Additional benefits that the include cache architecture can bring, like fault method and hot-spot revolution techniques. 04SETMCAO056
  • 11. According to Mark D. Hill , cache is used to improve the system cost, which have large memory but using the cache memory we increase the access time of the system. Cache is small in size so it holds some data at a time .cache memory hold that data which are frequently used by the processor. For storing cache retained the recent referenced information. Caches are successful due to temporal and spatial locality. Temporal locality means future references are likely to be made to the same locations as recent references, while spatial locality suggests that future references are also likely to be made to locations near recent references.  Caches take advantage of temporal locality by retaining recently referenced Information. 04SETMCAO056
  • 12. Methodology Now we are trying to use our cubic approach to map the memory. The family of cubic equation is f(x) =ax3+bx2+cx+d.We use the function h(x) = (ax 3+bx 2+cx+d) mod y For finding the key element in cache memory .in this formula we take the value of x between 0 to 15 and map the memory into cache between 0 to 15. For finding the solution we gives the value of x from 0 to 15 and change the values of a, b, c, d and calculate the function value y= ax3+bx2+cx+d and for the value of key element we calculate the value y modmheremis 16. 04SETMCAO056
  • 13. In this table we observe this cubic formula F(x)=(ax3+bx2+cx+) mody gives the value which is repeated in the column (ymod16),it means for that value of a,b,c,d it maps some memory address which is same.so this is not a correct mapping. X a b c d y Mod y 0 2 3 3 1 1 1 1 2 3 3 1 9 9 2 2 3 3 1 35 3 3 2 3 3 1 91 11 4 2 3 3 1 189 13 5 2 3 3 1 341 5 6 2 3 3 1 559 15 7 2 3 3 1 855 7 8 2 3 3 1 1241 9 9 2 3 3 1 1729 1 10 2 3 3 1 2331 11 11 2 3 3 1 3069 3 12 2 3 3 1 3925 5 13 2 3 3 1 4941 13 14 2 3 3 1 6119 7 04SETMCA56 15 2 3 3 1 7471 15
  • 14. State diagram Start 0,2,4,6,8 0,2,4,6,8 1,3,5,7,9 1,3,5,7,9 1,3,5,7,9 0,2,4,6,8 0 to 9 a Final/ hit b miss c d 04SETMCAO056
  • 15.  We notice that the function  F(x)= (ax3+bx2+cx+d)mod y  give unique value when we choose the value of a b & c such that a & b must be even and c must be odd but d consist any value between 0 to 9. above given state diagram shows how the function will work. 04SETMCAO056
  • 16. Result  Using this approach we decrease the time complexity of the direct mapping which is good and complexity is o(n) , its also help the decrease the process execution time. input(0-15) output(0-15)  The proposed work is to deal with caching and to secure the data in a random and cubic base approach. 04SETMCAO056 Cubic remapping system f(x) =ax3+bx2+cx+d
  • 17.  So we are using the cubic approach which maps the function more speedily than linear. In linear approach power consumption is also high using this approach we can also reduce the power consumption.  Using cubic approach we get the time complexity is o(n) . 04SETMCAO056
  • 18. Consider this snapshot as sample output ... 04SETMCAO056
  • 19. Conclusion  A cache is to improve system cost performance by providing the capacity of the large, slow memory with an access time close to that of the small, fast cache.  This simple approach implements a form of by passing the different address value. We develop a cubic approach to evaluate the performance of the proposed direct mapped caching algorithm our method enhances the reuse behavior of the temporal data while improving the reuse of the no temporal data by cubic associativity.  From our experimental results, we see that our method is both fast and accurate. 04SETMCAO056
  • 20. Future Enhancement  Future reaches issue can give better solution for this system , provided it overcomes the problems like replacement strategy that can better adopt to user access pattern and improve the cache space utilization , security issue. 04SETMCAO056