SlideShare a Scribd company logo
A Novel Approach Of Caching 
Direct Mapping Using Cubic 
Approach 
Guidance 
Professor Chandrasegar .T 
Site,vit university Vellore 
Team Member 
Kamlesh Asati 11MCA0133 
Aakansha Soni 11MCA0080 
Harikesh Dwivedi 11MCA0083 
04SETMCAO056
Aim 
 A novel approach of caching direct mapping 
using cubic approach appreciate to improve 
system efficiency without losses the data. 
 It means that decrease the data access time 
with using sufficient memory but that’s not 
enough while we are implement these things 
with minimum time complexity and high 
level security. 
04SETMCAO056
Objective Scope 
 Increase the system performs. 
 Decrease the process execution time and find 
the method in which time complexity in this 
approach is minimum. 
 Try to produce accurate result without data 
losses. 
04SETMCAO056
Abstract 
 In the last few decades there is lot of research 
works carried out for the improvement of c p u. 
 Caching address mapping technique plays a 
vital role for the system improvement. 
 Based on the number of hits occurred on the 
caching leads to the effective utilization of 
processor. 
 in general when the caching memory size 
increases then the number of page faults 
/misses is going to get decreases between the 
processor and the system memory. 
 In this concept the proposed work is to deal with 
caching direct mapping and to secure the data in 
a random and cubic based combinatorial 
approach. 
04SETMCAO056
Introduction 
Cache Memory Mapping 
 The memory system has to quickly determine if a 
given address is in the cache. 
 Caching address mapping techniques plays a vital 
role for the system improvement. Based on the no 
of hits occurred on the caching leads to the 
effective utilization of processor. 
There are three popular methods 
1) Fully associative mapping 
2) Set associative mapping 
3) Direct mapping 
04SETMCAO056
Direct Mapping 
 This is the most popular technique for 
cache memory mapping. 
 If each block from main memory has only 
one place it can appear in the cache, the 
cache is said to be direct mapped. 
 Since a data block from ram can only be on 
space line in the cache , it must always 
replace the one block that was already 
there. 
04SETMCAO056
 Address Splits into two part address 
S w 
 Least significant w bits identify unique word 
in block. 
 Most significant s bits specify one memory 
block. 
 s bits divided into two parts tag line 
s 
a) Cache line address field r bits. 
b) Tag field of s-r most significant bit. 
S-r r 
04SETMCAO056
Cubic Approach 
 In cubic approach for Mapping we map the 
data in random and cubic base approach. 
 For this we use the formula of cubic equation. 
F(x)= ax3+bx2+cx+d 
04SETMCAO056
Existing System 
 In direct mapping, mapping is done with the linear approach. 
For this we use hashing concept, If data is consist of n integers 
and we have k number of cells then the address where in data 
stored or retrieved is the ordinary hash function is Hash = n%k 
H (k, i) = (h (k) + ci) modm 
 Think how linear mapping works then the answer is if the first 
location is not free, then it will go to the next location and 
check if the location is free or not, and so on until it finds 
empty blocks or can’t find at all. For retrieving the data, hash 
function and rehash function is used, retrieving is done by 
using the hash function to find the key and check if the data 
would coincide to the data needed. If not then rehash would 
be needed. Until such time the correct location is found or an 
empty space is encountered which shows the data does not 
exists. In linear approach the searching takes so much time 
because in linear mapping it searches in all blocks of memory 
therefore the speed is slow. 
04SETMCAO056
Literature Review 
According to Zhenghong Wang and Ruby B. Lee , 
Caches ideally should have low miss rates and short 
access times, and should be power efficient to system 
at the same time. 
 Sincerely finding on efficient hits based on 
information losses in caches have also moves the 
security issue for it. finally this concept shows that 
the cache architecture has low Miss Rates 
comparable to a highly associative cache and short 
access times and power efficiency close to that of a 
direct-mapped cache. 
 Additional benefits that the include cache 
architecture can bring, like fault method and hot-spot 
revolution techniques. 
04SETMCAO056
According to Mark D. Hill , cache is used to 
improve the system cost, which have large 
memory but using the cache memory we 
increase the access time of the system. 
Cache is small in size so it holds some data at a 
time .cache memory hold that data which are 
frequently used by the processor. For storing 
cache retained the recent referenced 
information. 
Caches are successful due to temporal and 
spatial locality. Temporal locality means future 
references are likely to be made to the same 
locations as recent references, while spatial 
locality suggests that future references are also 
likely to be made to locations near recent 
references. 
 Caches take advantage of temporal locality by 
retaining recently referenced Information. 
04SETMCAO056
Methodology 
Now we are trying to use our cubic approach to 
map the memory. The family of cubic equation is 
f(x) =ax3+bx2+cx+d.We use the function 
h(x) = (ax 3+bx 2+cx+d) mod y 
For finding the key element in cache memory .in 
this formula we take the value of x between 0 to 15 
and map the memory into cache between 0 to 15. 
For finding the solution we gives the value of x 
from 0 to 15 and change the values of a, b, c, d and 
calculate the function value y= ax3+bx2+cx+d and 
for the value of key element we calculate the value 
y modmheremis 16. 
04SETMCAO056
In this table we 
observe this cubic 
formula 
F(x)=(ax3+bx2+cx+) 
mody gives the 
value which is 
repeated in the 
column (ymod16),it 
means for that 
value of a,b,c,d 
it maps some 
memory address 
which is same.so 
this is not a 
correct mapping. 
X a b c d y Mod y 
0 2 3 3 1 1 1 
1 2 3 3 1 9 9 
2 2 3 3 1 35 3 
3 2 3 3 1 91 11 
4 2 3 3 1 189 13 
5 2 3 3 1 341 5 
6 2 3 3 1 559 15 
7 2 3 3 1 855 7 
8 2 3 3 1 1241 9 
9 2 3 3 1 1729 1 
10 2 3 3 1 2331 11 
11 2 3 3 1 3069 3 
12 2 3 3 1 3925 5 
13 2 3 3 1 4941 13 
14 2 3 3 1 6119 7 
04SETMCA56 15 2 3 3 1 7471 15
State diagram 
Start 
0,2,4,6,8 0,2,4,6,8 1,3,5,7,9 
1,3,5,7,9 
1,3,5,7,9 0,2,4,6,8 
0 to 9 
a 
Final/ 
hit 
b 
miss 
c d 
04SETMCAO056
 We notice that the function 
 F(x)= (ax3+bx2+cx+d)mod y 
 give unique value 
when we choose the value of a b & c such 
that a & b must be even and c must be odd 
but d consist any value between 0 to 9. 
above given state diagram shows how the 
function will work. 
04SETMCAO056
Result 
 Using this approach we decrease the time 
complexity of the direct mapping which is 
good and complexity is o(n) , its also help the 
decrease the process execution time. 
input(0-15) output(0-15) 
 The proposed work is to deal with caching and 
to secure the data in a random and cubic base 
approach. 
04SETMCAO056 
Cubic remapping 
system 
f(x) =ax3+bx2+cx+d
 So we are using the cubic approach which 
maps the function more speedily than linear. 
In linear approach power consumption is also 
high using this approach we can also reduce 
the power consumption. 
 Using cubic approach we get the time 
complexity is o(n) . 
04SETMCAO056
Consider this snapshot as sample 
output ... 
04SETMCAO056
Conclusion 
 A cache is to improve system cost performance by 
providing the capacity of the large, slow memory 
with an access time close to that of the small, fast 
cache. 
 This simple approach implements a form of by 
passing the different address value. 
We develop a cubic approach to evaluate the 
performance of the proposed direct mapped caching 
algorithm our method enhances the reuse behavior of 
the temporal data while improving the reuse of the no 
temporal data by cubic associativity. 
 From our experimental results, we see that our 
method is both fast and accurate. 
04SETMCAO056
Future Enhancement 
 Future reaches issue can give better solution 
for this system , provided it overcomes the 
problems like replacement strategy that can 
better adopt to user access pattern and improve 
the cache space utilization , security issue. 
04SETMCAO056
THANK 
YOU

More Related Content

PDF
A Survey on Block Matching Algorithms for Video Coding
Yayah Zakaria
 
PDF
Colfax-Winograd-Summary _final (1)
Sangamesh Ragate
 
PDF
SPAA11
Yuan Tang
 
PDF
proposal_pura
Erick Lin
 
PDF
25010001
Premavardhan Reddy
 
PDF
(Paper Review)3D shape reconstruction from sketches via multi view convolutio...
MYEONGGYU LEE
 
DOC
Full Search Technique
lalithaganapathi
 
PPTX
Distributed approximate spectral clustering for large scale datasets
Bita Kazemi
 
A Survey on Block Matching Algorithms for Video Coding
Yayah Zakaria
 
Colfax-Winograd-Summary _final (1)
Sangamesh Ragate
 
SPAA11
Yuan Tang
 
proposal_pura
Erick Lin
 
(Paper Review)3D shape reconstruction from sketches via multi view convolutio...
MYEONGGYU LEE
 
Full Search Technique
lalithaganapathi
 
Distributed approximate spectral clustering for large scale datasets
Bita Kazemi
 

What's hot (18)

PDF
F044062933
IJERA Editor
 
PDF
50120130406039
IAEME Publication
 
PDF
Approximate Thin Plate Spline Mappings
Archzilon Eshun-Davies
 
PDF
New Chaotic Substation and Permutation Method for Image Encryption
tayseer Karam alshekly
 
PDF
Training and Inference for Deep Gaussian Processes
Keyon Vafa
 
PDF
Doc 20180130-wa0002
HarithaRanasinghe
 
DOCX
Os revision ques
John Jo
 
PPTX
2.5D Clip-Surfaces for Technical Visualization
Matthias Trapp
 
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
PDF
32 -longest-common-prefix
Sanjeev Gupta
 
PDF
Lecture 11 (Digital Image Processing)
VARUN KUMAR
 
PDF
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
PPT
Data comparation
Jay Choudhary
 
PDF
SPIRE2015-Improved Practical Compact Dynamic Tries
Andreas Poyias
 
PDF
Ijmsr 2016-05
ijmsr
 
PPTX
Geometry Batching Using Texture-Arrays
Matthias Trapp
 
PDF
A Three-Point Directional Search Block Matching Algorithm
Yayah Zakaria
 
F044062933
IJERA Editor
 
50120130406039
IAEME Publication
 
Approximate Thin Plate Spline Mappings
Archzilon Eshun-Davies
 
New Chaotic Substation and Permutation Method for Image Encryption
tayseer Karam alshekly
 
Training and Inference for Deep Gaussian Processes
Keyon Vafa
 
Doc 20180130-wa0002
HarithaRanasinghe
 
Os revision ques
John Jo
 
2.5D Clip-Surfaces for Technical Visualization
Matthias Trapp
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
32 -longest-common-prefix
Sanjeev Gupta
 
Lecture 11 (Digital Image Processing)
VARUN KUMAR
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
Data comparation
Jay Choudhary
 
SPIRE2015-Improved Practical Compact Dynamic Tries
Andreas Poyias
 
Ijmsr 2016-05
ijmsr
 
Geometry Batching Using Texture-Arrays
Matthias Trapp
 
A Three-Point Directional Search Block Matching Algorithm
Yayah Zakaria
 
Ad

Similar to A Novel Approach of Caching Direct Mapping using Cubic Approach (20)

PPTX
2. Cache Mapping.pptx
KarthikeyanC53
 
PPTX
How Computer Cache Works
Rishabh Dubey
 
PPTX
Address mapping
rockymani
 
PPTX
Cache memory
Anand Goyal
 
PPT
Memory organization including cache and RAM.ppt
bansidhar11
 
PPTX
Cache memory
Shailesh Tanwar
 
PPTX
Cache memory
Abir Rahman
 
PPTX
Blue and Green Narrative Writing Story Starters Education Presentation _20241...
1015MahalakshmiXIIA
 
PPTX
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
PrajanSanjayK
 
PPTX
Lecture 10b - Ch No. 04 (Part 02) (1).pptx
AdeelAsghar36
 
PDF
DLCA-UNIT-5-Memory Organization-Cache.pdf
DrKRadhikaProfessorD
 
PPTX
M.f
maamir farooq
 
PPTX
Cache Memory.pptx
AshokRachapalli1
 
PPT
Memory Organization and Cache mapping.ppt
bansidhar11
 
PDF
Advanced Computer Architecture chapter 5 problem solutions
Joe Christensen
 
PPTX
Mapping
Syed Ali Sherazi
 
PPTX
GRP13_CACHE MEMORY ORGANIZATION AND DIFFERENT CACHE MAPPING TECHNIQUES.pptx
DANCERAMBA
 
PPT
cache memory.ppt
MUNAZARAZZAQELEA
 
PPT
cache memory.ppt
MUNAZARAZZAQELEA
 
PPTX
Mapping functions
Lahore Garrison University
 
2. Cache Mapping.pptx
KarthikeyanC53
 
How Computer Cache Works
Rishabh Dubey
 
Address mapping
rockymani
 
Cache memory
Anand Goyal
 
Memory organization including cache and RAM.ppt
bansidhar11
 
Cache memory
Shailesh Tanwar
 
Cache memory
Abir Rahman
 
Blue and Green Narrative Writing Story Starters Education Presentation _20241...
1015MahalakshmiXIIA
 
475841235-Presentation-on-Cache-memory-Operating-system-CSE-309-1-pptx.pdf.pptx
PrajanSanjayK
 
Lecture 10b - Ch No. 04 (Part 02) (1).pptx
AdeelAsghar36
 
DLCA-UNIT-5-Memory Organization-Cache.pdf
DrKRadhikaProfessorD
 
Cache Memory.pptx
AshokRachapalli1
 
Memory Organization and Cache mapping.ppt
bansidhar11
 
Advanced Computer Architecture chapter 5 problem solutions
Joe Christensen
 
GRP13_CACHE MEMORY ORGANIZATION AND DIFFERENT CACHE MAPPING TECHNIQUES.pptx
DANCERAMBA
 
cache memory.ppt
MUNAZARAZZAQELEA
 
cache memory.ppt
MUNAZARAZZAQELEA
 
Mapping functions
Lahore Garrison University
 
Ad

Recently uploaded (20)

PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
CDH. pptx
AneetaSharma15
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 

A Novel Approach of Caching Direct Mapping using Cubic Approach

  • 1. A Novel Approach Of Caching Direct Mapping Using Cubic Approach Guidance Professor Chandrasegar .T Site,vit university Vellore Team Member Kamlesh Asati 11MCA0133 Aakansha Soni 11MCA0080 Harikesh Dwivedi 11MCA0083 04SETMCAO056
  • 2. Aim  A novel approach of caching direct mapping using cubic approach appreciate to improve system efficiency without losses the data.  It means that decrease the data access time with using sufficient memory but that’s not enough while we are implement these things with minimum time complexity and high level security. 04SETMCAO056
  • 3. Objective Scope  Increase the system performs.  Decrease the process execution time and find the method in which time complexity in this approach is minimum.  Try to produce accurate result without data losses. 04SETMCAO056
  • 4. Abstract  In the last few decades there is lot of research works carried out for the improvement of c p u.  Caching address mapping technique plays a vital role for the system improvement.  Based on the number of hits occurred on the caching leads to the effective utilization of processor.  in general when the caching memory size increases then the number of page faults /misses is going to get decreases between the processor and the system memory.  In this concept the proposed work is to deal with caching direct mapping and to secure the data in a random and cubic based combinatorial approach. 04SETMCAO056
  • 5. Introduction Cache Memory Mapping  The memory system has to quickly determine if a given address is in the cache.  Caching address mapping techniques plays a vital role for the system improvement. Based on the no of hits occurred on the caching leads to the effective utilization of processor. There are three popular methods 1) Fully associative mapping 2) Set associative mapping 3) Direct mapping 04SETMCAO056
  • 6. Direct Mapping  This is the most popular technique for cache memory mapping.  If each block from main memory has only one place it can appear in the cache, the cache is said to be direct mapped.  Since a data block from ram can only be on space line in the cache , it must always replace the one block that was already there. 04SETMCAO056
  • 7.  Address Splits into two part address S w  Least significant w bits identify unique word in block.  Most significant s bits specify one memory block.  s bits divided into two parts tag line s a) Cache line address field r bits. b) Tag field of s-r most significant bit. S-r r 04SETMCAO056
  • 8. Cubic Approach  In cubic approach for Mapping we map the data in random and cubic base approach.  For this we use the formula of cubic equation. F(x)= ax3+bx2+cx+d 04SETMCAO056
  • 9. Existing System  In direct mapping, mapping is done with the linear approach. For this we use hashing concept, If data is consist of n integers and we have k number of cells then the address where in data stored or retrieved is the ordinary hash function is Hash = n%k H (k, i) = (h (k) + ci) modm  Think how linear mapping works then the answer is if the first location is not free, then it will go to the next location and check if the location is free or not, and so on until it finds empty blocks or can’t find at all. For retrieving the data, hash function and rehash function is used, retrieving is done by using the hash function to find the key and check if the data would coincide to the data needed. If not then rehash would be needed. Until such time the correct location is found or an empty space is encountered which shows the data does not exists. In linear approach the searching takes so much time because in linear mapping it searches in all blocks of memory therefore the speed is slow. 04SETMCAO056
  • 10. Literature Review According to Zhenghong Wang and Ruby B. Lee , Caches ideally should have low miss rates and short access times, and should be power efficient to system at the same time.  Sincerely finding on efficient hits based on information losses in caches have also moves the security issue for it. finally this concept shows that the cache architecture has low Miss Rates comparable to a highly associative cache and short access times and power efficiency close to that of a direct-mapped cache.  Additional benefits that the include cache architecture can bring, like fault method and hot-spot revolution techniques. 04SETMCAO056
  • 11. According to Mark D. Hill , cache is used to improve the system cost, which have large memory but using the cache memory we increase the access time of the system. Cache is small in size so it holds some data at a time .cache memory hold that data which are frequently used by the processor. For storing cache retained the recent referenced information. Caches are successful due to temporal and spatial locality. Temporal locality means future references are likely to be made to the same locations as recent references, while spatial locality suggests that future references are also likely to be made to locations near recent references.  Caches take advantage of temporal locality by retaining recently referenced Information. 04SETMCAO056
  • 12. Methodology Now we are trying to use our cubic approach to map the memory. The family of cubic equation is f(x) =ax3+bx2+cx+d.We use the function h(x) = (ax 3+bx 2+cx+d) mod y For finding the key element in cache memory .in this formula we take the value of x between 0 to 15 and map the memory into cache between 0 to 15. For finding the solution we gives the value of x from 0 to 15 and change the values of a, b, c, d and calculate the function value y= ax3+bx2+cx+d and for the value of key element we calculate the value y modmheremis 16. 04SETMCAO056
  • 13. In this table we observe this cubic formula F(x)=(ax3+bx2+cx+) mody gives the value which is repeated in the column (ymod16),it means for that value of a,b,c,d it maps some memory address which is same.so this is not a correct mapping. X a b c d y Mod y 0 2 3 3 1 1 1 1 2 3 3 1 9 9 2 2 3 3 1 35 3 3 2 3 3 1 91 11 4 2 3 3 1 189 13 5 2 3 3 1 341 5 6 2 3 3 1 559 15 7 2 3 3 1 855 7 8 2 3 3 1 1241 9 9 2 3 3 1 1729 1 10 2 3 3 1 2331 11 11 2 3 3 1 3069 3 12 2 3 3 1 3925 5 13 2 3 3 1 4941 13 14 2 3 3 1 6119 7 04SETMCA56 15 2 3 3 1 7471 15
  • 14. State diagram Start 0,2,4,6,8 0,2,4,6,8 1,3,5,7,9 1,3,5,7,9 1,3,5,7,9 0,2,4,6,8 0 to 9 a Final/ hit b miss c d 04SETMCAO056
  • 15.  We notice that the function  F(x)= (ax3+bx2+cx+d)mod y  give unique value when we choose the value of a b & c such that a & b must be even and c must be odd but d consist any value between 0 to 9. above given state diagram shows how the function will work. 04SETMCAO056
  • 16. Result  Using this approach we decrease the time complexity of the direct mapping which is good and complexity is o(n) , its also help the decrease the process execution time. input(0-15) output(0-15)  The proposed work is to deal with caching and to secure the data in a random and cubic base approach. 04SETMCAO056 Cubic remapping system f(x) =ax3+bx2+cx+d
  • 17.  So we are using the cubic approach which maps the function more speedily than linear. In linear approach power consumption is also high using this approach we can also reduce the power consumption.  Using cubic approach we get the time complexity is o(n) . 04SETMCAO056
  • 18. Consider this snapshot as sample output ... 04SETMCAO056
  • 19. Conclusion  A cache is to improve system cost performance by providing the capacity of the large, slow memory with an access time close to that of the small, fast cache.  This simple approach implements a form of by passing the different address value. We develop a cubic approach to evaluate the performance of the proposed direct mapped caching algorithm our method enhances the reuse behavior of the temporal data while improving the reuse of the no temporal data by cubic associativity.  From our experimental results, we see that our method is both fast and accurate. 04SETMCAO056
  • 20. Future Enhancement  Future reaches issue can give better solution for this system , provided it overcomes the problems like replacement strategy that can better adopt to user access pattern and improve the cache space utilization , security issue. 04SETMCAO056