A study on performance evaluation of conventional cache replacement algorithms: A review
Cache Replacement Policies play a significant and contributory role in the context of determining the effectiveness of cache memory cells. It has also become one of the major key features for efficient memory management from the technological aspect. Hence, owing to the existing critical computing s...
| Main Authors: | Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Khan, Burhan Ul Islam, Yaacob, Mashkuri, Azman, Amelia Wong, Mir, Mohammad Shuaib |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
IEEE
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/56847/ http://irep.iium.edu.my/56847/7/56847.pdf |
Similar Items
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Real time telemedical health care systems with wearable sensors
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
An evaluation of transform domain watermarking and its application to intellectual properties images
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Design and implementation of a five stage pipelining architecture simulator for RiSC-16 instruction set
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
A hasty approach to ECG person identification
by: Wali, Tuerxun, et al.
Published: (2016)
by: Wali, Tuerxun, et al.
Published: (2016)
Feasibility analysis of integrated hybrid systems of wireless sensor networks and conventional networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
An estimation of the coupling coefficient of the series inductive resonant wireless power transfer coils
by: Adam, Ismail, et al.
Published: (2020)
by: Adam, Ismail, et al.
Published: (2020)
Wide range modulation indexes featuring carrier-based PWM stepped waveform for half-bridge modular multilevel converters
by: Tohtayong, Majdee, et al.
Published: (2018)
by: Tohtayong, Majdee, et al.
Published: (2018)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
The load reliant power transfer of the series-to-series inductive resonant wireless power transfer
by: Adam, Ismail, et al.
Published: (2020)
by: Adam, Ismail, et al.
Published: (2020)
Modelling and simulation of 1.2 MWp tenaga suria brunei photovoltaic power plant
by: Qayyum, Md, et al.
Published: (2020)
by: Qayyum, Md, et al.
Published: (2020)
A laser pointer communicating toy
by: Baharudin, Ain Najihah, et al.
Published: (2018)
by: Baharudin, Ain Najihah, et al.
Published: (2018)
Power analysis with variable traffic loads for next generation interconnection networks
by: Faisal, Faiz Al, et al.
Published: (2016)
by: Faisal, Faiz Al, et al.
Published: (2016)
Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility
by: Hussein, Loay F., et al.
Published: (2016)
by: Hussein, Loay F., et al.
Published: (2016)
A new power efficient high performance interconnection network for many-core processors
by: Al Faisal, Faiz, et al.
Published: (2017)
by: Al Faisal, Faiz, et al.
Published: (2017)
Convolutional neural network based handwritten Bengali and Bengali-English mixed numeral recognition
by: Akhand, M. A. H, et al.
Published: (2016)
by: Akhand, M. A. H, et al.
Published: (2016)
SCCN: a cost effective hierarchical interconnection network for network-on-chip
by: N. M. Ali, Mohammed, et al.
Published: (2016)
by: N. M. Ali, Mohammed, et al.
Published: (2016)
An efficient technique for retinal vessel segmentation and denoising using modified isodata and CLAHE
by: Khan, Khan Bahadarkhan, et al.
Published: (2016)
by: Khan, Khan Bahadarkhan, et al.
Published: (2016)
A novel multilevel DC - AC converter from green energy power generators using step-square waving and PWM technique
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
Development of portable digital spirometer using NI sbRIO
by: Ibrahim, Siti Noorjannah, et al.
Published: (2018)
by: Ibrahim, Siti Noorjannah, et al.
Published: (2018)
Overview on fingerprinting authentication technology
by: Sulaiman, Nadzril, et al.
Published: (2020)
by: Sulaiman, Nadzril, et al.
Published: (2020)
Performance evaluation of scenerio-aware protocol
for producer mobility support in NDN
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
Simulation of handoff algorithm for NDN producer’s mobility
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
Similar Items
-
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016) -
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)