Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Algorithms Articles - Page 7 of 51
8K+ Views
Having the upper hand in computer operating systems, the CPU scheduling algorithm is a widely used method for scheduling processes. It is intended to make sure that the most important processes have priority access to the CPU so that system responsiveness and efficiency are maximized. Each process in preemptive priority scheduling is given a priority value, which is often established by the nature and significance of the current job. When a higher-priority process becomes available, the one that is presently executing is preempted and the higher-priority process is executed in its place. The highest priority process is granted access to ... Read More
2K+ Views
Operating systems utilize a data structure called a precedence graph to show the interdependencies between various tasks or processes. Another name for it is a Task Dependency Graph. Several processes may be running at once in a multi-tasking operating system, and some of these processes may wait for others to finish before they can start executing. These dependencies are represented by a Precedence graph, which is a directed graph with each node being a process or task and edges denoting dependencies between tasks. In the precedence graph, each node's label indicates which process or task it corresponds to, and each ... Read More
2K+ Views
The POSIX thread standard is followed by POSIX threads, sometimes referred to as pthreads. A program may be made parallel by using threads, which divide a single job into a number of separate ones that can run simultaneously. Threads in operating systems can either be user-level or kernel-level and are handled by the kernel. While the operating system manages kernel-level threads, user-level threads are totally controlled by the application. Kernel-level threads include POSIX threads. A thread creation and manipulation API is defined by the POSIX thread standard. The methods in this API allow you to start new threads, modify ... Read More
14K+ Views
Coordinating the operations of processes that are running concurrently is the core concern of process synchronization, a basic issue in computer science. A crucial component of process synchronization, the mutual exclusion issue has a well-known solution in Peterson's Algorithm. This mutual exclusion algorithm, developed by Gary Peterson in 1981, is one of the most straightforward and popular ones. Peterson's Algorithm will be thoroughly examined in this article, including its description, justification for being accurate, benefits and drawbacks, comparison to other algorithms, applications, and conclusion. Petersons Algorithm Set turn to either 0 or 1, indicating which process can enter its ... Read More
1K+ Views
A two-level paging system, sometimes known as hierarchical paging, is a way to translate virtual addresses to physical addresses in a computer system with a lot of physical memory. The page table is split into two sections in a two-level paging scheme: a top-level page table and a bottom-level page table. Pointers to the bottom-level page tables are present in the top-level page table. A piece of the virtual address space is mapped to a component of the physical address space in each bottom-level page table. The processor initially utilizes the page number to index into the top-level page table ... Read More
824 Views
Mutual exclusion is a program object that relates to the condition that no two concurrent processes be in the same crucial region at the same time. It is offered to prevent the race condition from occurring. If a current process is accessing the crucial part, it prohibits another concurrent process from entering there. In a nutshell, only one process is authorized to perform the vital part at any one moment. What are performance metrics for mutual exclusion? Programming object mutual exclusion describes the need that no two concurrent processes take place in a crucial region at the same time. It ... Read More
2K+ Views
Within the domain of present-day cryptography, two noticeable calculations have played significant parts in securing delicate information Diffie-Hellman and RSA. Whereas both strategies are broadly utilized for key trade and encryption, they employ effective approaches to attain their cryptographic objectives. Diffie-Hellman, created by Whitfield Diffie and Martin Hellman in 1976, focuses on securing key trade conventions, empowering parties to set up a shared mystery over an uncertain channel. On the other hand, RSA, named after its makers Ron Rivest, Adi Shamir, and Leonard Adleman, utilizes public-key encryption to defend information secrecy, verification, and computerized marks. This article dives into the ... Read More
334 Views
Scheduling algorithms are designed for serving the processes by providing the maximum utilization of the resources. The resources that are allocated to execute the given input, should not remain idle and repetitive projects has to be handled by the resources simultaneously without any break. Considering all these factors, a few simulation approaches have been developed to improve the repetitive activities by analyzing the nature of the process but none of the approaches delivered maximum resource utilization. Later, the sequence step algorithm has been initiated to minimize the processing and execution time of the process by determining the probability of process ... Read More
440 Views
Within the domain of computer frameworks and capacity gadgets, the execution of disk planning plays an essential part in optimizing information get to and recovery. Two basic components that altogether affect disk execution are seek time and transfer time. Seek time speaks to the length it takes for the disk arm to move to the specified track, whereas transfer time signifies the time required to examined or type in information once the required track is situated. This article points to investigate and explain the elemental contrasts between seek time and transfer time, shedding light on their person importance in disk ... Read More
564 Views
Disk scheduling algorithms play a pivotal part in optimizing the execution of disk frameworks by proficiently getting to information. Among the different calculations, Scan (moreover known as the elevator algorithm) and FCFS (First-Come-First-Serve) are two commonly utilized approaches with particular procedures. Check moves the disk arm over the platter in a specific design, adjusting demands because it clears in one course, which minimizes the look for time and improves productivity. On the other hand, FCFS follows a straightforward guideline of servicing the demands within the arrangement they arrive at, without any thought for the area of information on the disk. ... Read More