Algorithms Articles

Page 4 of 39

Fair-share CPU scheduling

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 3K+ Views

Fair-share CPU scheduling is a scheduling algorithm used in operating systems that aims to allocate CPU resources fairly among different user or process groups. Unlike traditional priority-based schedulers, fair-share scheduling assigns a weight to each process group based on its historical usage and allocates CPU time to ensure no group is starved of resources for extended periods. This scheduling approach is particularly valuable in multi-user systems and virtualized environments where multiple users or virtual machines share a single physical CPU. It provides better resource utilization and ensures equal opportunities for all groups to access CPU time. How Fair-Share ...

Read More

Difference Between Table-driven and Cyclic Scheduling

Pradeep Kumar
Pradeep Kumar
Updated on 17-Mar-2026 1K+ Views

Scheduling algorithms play a crucial role in managing the execution of tasks in operating systems and real-time systems. Two common scheduling approaches are table-driven scheduling and cyclic scheduling. These approaches have distinct characteristics and are suitable for different types of systems and scheduling requirements. What is Table-driven Scheduling? Table-driven scheduling, also known as static scheduling, involves creating a predefined table that specifies the execution order and time requirements for each task or process. The table contains a schedule for the entire duration of the system's operation. The scheduler follows the table to determine which task should execute at ...

Read More

Edge Chasing Algorithms

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 2K+ Views

Edge chasing algorithms are techniques used in operating systems and computer hardware to handle events or signals that occur asynchronously with the processor's clock cycle. These algorithms detect and respond to events as they occur, minimizing the delay between the event and the system's response. They are essential for interrupt handling, input/output operations, and other time-sensitive tasks in modern computer systems. How Edge Chasing Works Edge chasing involves monitoring for state changes or "edges" in system signals. When an edge is detected (such as a device becoming ready or an interrupt being raised), the system immediately responds rather ...

Read More

Linear Scheduling Method in Operating System

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 390 Views

Linear Scheduling Method (LSM) is a scheduling algorithm designed for real-time systems where tasks must be completed within specific time frames to ensure proper system operation. It assigns tasks based on their deadlines and provides them with fixed time slices to complete their execution. This straightforward algorithm arranges tasks in linear order and moves through the list sequentially. How Linear Scheduling Method Works Tasks in LSM are arranged in a linear queue, and the scheduler moves through the list, allocating fixed time slices to each task in turn. The length of each time slice is predetermined based on ...

Read More

Operating system time slicing in round robin scheduling

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 478 Views

Round Robin (RR) is a CPU scheduling algorithm where each process is assigned a fixed time slot called a time slice (or time quantum). The CPU cycles through all ready processes in order, giving each one the time slice. If a process does not finish within its time slice, it is moved to the back of the queue and the next process gets the CPU. This is one of the simplest and most widely used scheduling algorithms in operating systems, especially in time-sharing systems where fair CPU allocation is important. How Round Robin Scheduling Works The scheduler ...

Read More

Non-persistent CSMA protocol

Fendadis John
Fendadis John
Updated on 16-Mar-2026 3K+ Views

Non-persistent CSMA is a non-aggressive version of Carrier Sense Multiple Access (CSMA) protocol that operates in the Medium Access Control (MAC) layer. Using CSMA protocols, multiple users or nodes send and receive data through a shared medium that may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum. In non-persistent CSMA, when a transmitting station has a frame to send and it senses a busy channel, it waits for a random period of time without sensing the channel in the interim, and repeats the algorithm again. ...

Read More

Encryption, its Algorithms and its Future

Pranavnath
Pranavnath
Updated on 16-Mar-2026 492 Views

Encryption is a method to protect data by transforming plain text into an encoded format called cipher text. The main purpose of encryption is to secure data transmission and storage from unauthorized access and attacks. There are two primary types of encryption: symmetric encryption (using a single shared key) and asymmetric encryption (using a pair of public and private keys). Encryption Process Plain Text "Hello World" Encryption Algorithm + Key Cipher Text ...

Read More

Longest Job First (LJF) CPU Scheduling Algorithm

Diksha Patro
Diksha Patro
Updated on 16-Mar-2026 3K+ Views

Longest Job First (LJF) is a CPU scheduling algorithm that prioritizes processes based on their burst time. In LJF, the processes with the largest burst time are given priority over the shorter ones. This algorithm works on a non-preemptive basis, meaning once a process is started, it will continue to run until it completes, and no other process can preempt it. To implement the LJF algorithm, processes are sorted in the ready queue based on their burst times in descending order. The process with the largest burst time among all the processes that have arrived until that time is ...

Read More

Block Cipher Design Principles

Pranavnath
Pranavnath
Updated on 16-Mar-2026 17K+ Views

A Block Cipher is an encryption algorithm that works with a symmetric key to transform fixed-size blocks of plaintext into ciphertext blocks of the same size. The plaintext is divided into several blocks of equal size, typically 64, 128, or 256 bits. If the plaintext length doesn't allow equal block division, padding is applied to complete the final block. Block ciphers process each block independently using the same key, producing deterministic output where n input bits always generate n output bits. However, identical plaintext blocks can produce different ciphertext blocks depending on the encryption mode used. This makes block ...

Read More

Unlock the Secrets Behind Our Game-Changing Probabilistic Shortest Path Algorithm for Optical Networks

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 403 Views

In today's data-driven world, optical networks play a crucial role in ensuring fast and reliable communication. One key aspect of optimizing these networks is implementing effective routing algorithms to find the shortest paths between nodes. The probabilistic shortest path routing algorithm for optical networks is an innovative solution designed to enhance network performance, latency, and reliability. By leveraging cutting-edge techniques such as Dijkstra's algorithm, fuzzy logic, and graph theory, this approach offers promising results in improving throughput by 10-20%. Understanding the Algorithm The probabilistic shortest path routing algorithm combines traditional graph theory with probability calculations to find ...

Read More
Showing 31–40 of 386 articles
« Prev 1 2 3 4 5 6 39 Next »
Advertisements