Skip to main content

Computer researchers published a new algorithm that revolutionizes web management.



The new database structures require new and powerful tools to manage databases in non-centralized solutions. The new data structures can be in large areas, and parts of them might be in different computers. This kind of network requires very good management. And fast reactions. In modern computing infrastructure networks play a vital role. When the system collects data from multiple sources, it should observe that data. That left from the source is the same in destiny. 

In old times TCP/IP-protocol there system sent checksum or every data packet back to sender to compile that it's not changed is powerful. But when things like AI should collect data even from millions of sources, and then the system creates a new entirety. In that process, the TCP/IP is a too-slow protocol that can handle millions of bits that come from multiple sources. At the same time. 


"A logo for SIEVE, created by Yazhuo Zhang, portrays hotter objects in shades of red and colder ones in shades of blue. Zhang also designed a web site for SIEVE, including a motion graphic demonstrating how it works. Credit: Yazhuo Zhang"


You can see how this new algorithm acts. The idea is that the system gets the command "select red balls". Then, the system just lets red balls through the filter or cache. The system keeps "red "or "hot" balls in place, where users can get them fast. The blue or "not so "popular" objects can let go somewhere where they don't fill the cache. So the system stores only "hot" data packs in the cache, and the system can put the rest of the data packs in hard disks. 

The antivirus can also use this methodology. The antivirus can put its mark on data packages that it checked those data packages. The system can program those files that travel in it will not open until the antivirus checks them and puts the "pass" mark on those files. 

************************************************************



"Cache-eviction algorithms determine what objects to toss and when to do so.


Computer scientists have developed a highly effective, yet incredibly simple, algorithm to decide which items to toss from a web cache to make room for new ones. Known as SIEVE, the new open-source algorithm holds the potential to transform the management of web traffic on a large scale.

FIFO, or “first-in, first-out,” is a classic eviction algorithm developed in the 1960s. Imagine objects lined up on a conveyor belt. Newly requested objects enter on the left and the oldest objects get evicted when they reach the end of the line on the right.

In the LRU, or “least recently used,” algorithm the objects also move along the line toward eviction at the end. However, if an object is requested again while it moves down the conveyor belt, it gets moved back to the head of the line.

Like LRU and some other algorithms, SIEVE makes a simple tweak to the basic FIFO scheme.

SIEVE initially labels a requested object as a “zero.” If the object is requested again as it moves down the belt, its status changes to “one.” When an object labeled “one” makes it to the end of the line it is automatically reset to “zero” and evicted.

A pointer, or “moving hand,” also scans the objects as they travel down the line. The pointer starts at the end of the line and then jumps to the head, moving in a continuous circle. Anytime the pointer hits an object labeled “zero,” the object is evicted.

'

The last part is from the ScitechDaily.com/ Revolutionizing Web Caching: Computer Scientists Unveil Simple Yet Game-Changing Algorithm


**************************************************************


Keeping ‘hot objects’ handy

Many people understand the value of regularly reorganizing their clothing closet. Items that are never used can be tossed and those that are rarely used can be moved to the attic or some other remote location. That leaves the items most commonly worn within easy reach so they can be found quickly, without rummaging around.

A cache is like a well-organized closet for computer data. The cache is filled with copies of the most popular objects requested by users, or “hot objects” in IT terminology. The cache maintains this small collection of hot objects separately from a computer network’s main database, which is like a vast warehouse filled with all the information that could be served by the system.


The last part is from the ScitechDaily.com/ Revolutionizing Web Caching: Computer Scientists Unveil Simple Yet Game-Changing Algorithm


********************************************************************

Separating "hot objects from data flow makes the system more effective. The system can transfer widely used data objects to another cache there is not so much data. Or it can transfer the most used data packages even to the workstation memories. Whenever a computer searches data that thing takes a couple of seconds. But what if there are billions of data packages stored in a cache, and the system always must search them by one to one? In large networks, there could be even thousands of queries all the time. 

The SIEVE can also make networks faster because it helps to detect data packs that net protection programs like antivirus handle. The antivirus puts a mark on the data pack. And that mark allows programs to open the data pack. If there is no mark the data pack will transfer back to the antivirus. 


If the antivirus doesn't check all things that travel in the network. That can cause malware infection.  The antivirus can also put its mark on the data packs that it checked. That denies the ability to slip non-checked data inside the network. 

 The thing that makes this new algorithm effective is that it marks the data bite to value zero while it travels in line. And then SIEVE returns in value into one. when it's the end of the route. This thing helps things like antivirus programs separate data packages that are already analyzed. In this model, the "zero" means "don't touch". And the value one means that the system can catch the data pack.


https://scitechdaily.com/revolutionizing-web-caching-computer-scientists-unveil-simple-yet-game-changing-algorithm/


https://techxplore.com/news/2024-01-scientists-simple-method-cache-sifting.html

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....