Theoretical Analysis of Novel Variants of MTF Algorithm: Debashish Rout
Theoretical Analysis of Novel Variants of MTF Algorithm: Debashish Rout
=
=
n
i
i
P T
MPITF
C
1
1
) (
= =
=
=
n
n
i
i
n
n
i
i
n
P
P
C T
MPITF
C
2
1
2
2
) (
n,even
n, odd
Theoretical Analysis Of Novel Variants Of
www.ijmsi.org 22 | P a g e
Proposition 4:-For T
2
request sequence of size n, the cost of MPITF is given by
Proposition 5:-For Type 4 request sequence of size n, the cost of MSITF is given by
Proposed Theorems:-
Theorem 1:-For Type 2 request sequence of size n, the cost of MPITF is given by
Proof-
l=Size of the list
n=Size of the request sequence
n = o n L =
Assume that ) 2 (Type C
MSITF
=
n
P
n
P = 1 ) 1 .( + n n
Basic Case
1
P =1(1-1) +1
R. H.S=n (n-1) +1
=1(1-1) +1
=1
L. H. S-
As list contains a single element, the position of that element is always 1. The reverse order of
that single element is same as that of the single element of that list. There is no succeeding element present in the
list for that single element. From that list only one request sequence is generated containing single element. By
help of MSITF, the total accessed cost is 1.
L.H. S= R. H. S
Hence
1
P is true.
Inductive Step
Let
n
P is true for n=k i.e.
k
P = 1 ) 1 .( + k k
= 1
2
+ k k
Now we have to prove that
1 + k
P = 1 ) 1 1 .( 1 + + + k k
=
1
1 ) ( 1
2
+ + =
+ +
k k
k k
+
=
=
+
=
2
1
) (
2
1
0
1 2
2
1
2
1
n
P
P
T
MSITF
C
n
o
o
n
e
i
n,even
n, odd
1 ) 1 .( ) (
2
+ = n n T
MSITF
C
= ) (
4
T
MSITF
C
1 .......... 1 , ,
1
1
2
=
=
+ =
n i Where
C C
n C
i i
n
1 ) 1 .( ) (
2
+ = n n T
MSITF
C
Theoretical Analysis Of Novel Variants Of
www.ijmsi.org 23 | P a g e
Let the elements of the list of size k be
k
l l l ..... ,
2 1
and the elements of request sequence be
k
r r r ....
2 , 1
such that all the elements of the list are present in the request sequence. Let (k+1) th element
1 + k
l occurs after
k
l in the list and
1 + k
r occur after
k
r in the request sequence. The access cost of k element
is 1
2
+ k k . Whereas the total access cost including (k+1) th element in request sequence in the list is
=
k
P + 2k
As every time the next cost is increased with a factor of 2n i.e. 2k.
= 1
2
+ k k +2k
= 1
2
+ + k k
So L.H.S= R.H.S
Hence
1 + k
P is true.
So the expression is true for all n.
Theorem 2:-For Type 1 request sequence of size n, the cost of MPITF is given by
P
i
--Position of the element
Proof-
Let
) (n C
MPITF
cost is denoted by
=
=
n
i
i n
P C
1
Where
n
C is a proposition about natural number such that
n
C is true?
Basic Case
1
1
1
1 1
= =
= i
P C
Let there is a single element in the list l i.e.
1
l and single element in the request sequence r i.e.
1
r .
As a single element present in the list, so the position of that element is 1 always. The cost of the
request sequence by using MPITF is 1 always.
So
1
C is true.
Inductive Step
Let
n
C is true for n=k i.e.
=
=
k
i
i k
P C
1
Now we have to prove that
+
=
= +
1
1
1
k
i
i k
P C
R.H.S=
+
=
1
1
k
i
i
P =0+1+2+3+. +k+ (k+1)
= (0+1+2+3+. +k) + (k+1)
= (
=
k
i
i
P
1
) + (k+1)
Let the elements of the list of size k be
k
l l l ..... ,
2 1
and the elements of request sequence be
k
r r r ....
2 , 1
such that all the elements of the list are present in the request sequence. Let (k+1) th element
1 + k
l occurs after
k
l in the list and
1 + k
r occur after
k
r in the request sequence. The access cost of k element is
=
=
n
i
i
P T
MPITF
C
1
1
) (
Theoretical Analysis Of Novel Variants Of
www.ijmsi.org 24 | P a g e
=
k
i
i
P
1
where as the access cost of (k+1) th element of request sequence in the list is (k+1) because position of
that (k+1) th element is (k+1) .So total access cost for the (k+1) element is
=
k
i
i
P
1
+ (k+1).
So L.H.S=R.H.S
Hence
1 + k
C
is true.
So the expression is true for all n.
IV. CONCLUSION
Here we have derived some formula for special request sequence these formula are proved by Induction
principle.
V. ACKNOWLEGDEMENT:-
This work is during my M.TECH career under supervision of Rakesh Mohanty ,Lecturer ,Department of
Computer Science and Engineering ,VSSUT ,Burla.
REFERENCES:-
[1] J. McCabe, On serial files with relocatable records, Operational Research, vol. 12, pp.609-618, 1965.
[2] G. Jr. Schay, F.W. Dauer-A Probabilistic Model for a Self Organizing File System, SIAM J.of Applied Mathematics, (15) 874-
888, 1967.
[3] P.J Burvile and J.F.C. Kingman On a model for storage and search J. of Applied Probability, 10:697-701, 1973.
[4] R. Rivest-On Self Organizing Sequential Search Heuristics, Communications of the ACM, 19, 2:63-67, 1976.
[5] J.R. Bitner Heuristics that dynamically organize data structures- SIAM J. of Computing, 8(1):82-110, 1979.
[6] G.H. Gonet, J. I, Munro and H. Suwanda, Towards self organizing linear search-FOCS, 169-174, 1979.
[7] G.H. Gonet, J. I, Munro and H. Suwanda, Exegenesis of self organizing linear search, SIAM Journal of Computing, Vol. 10,
no.3, pp.613-637, 1981.
[8] D. D. Sleator and R. E. Tarjan, Amortized efficiency of list update paging rules, Commun. ACM, vol. 28 no. 2, pp.202-208,
1985
[9] J. H. Hester, D. S. Hirschberg Self organizing linear search ACM Computing Surveys, 17(3): 295-312, 1985.
[10] J.L. Bently and C. C. McGeoch, Amortized analysis of self-organizing sequential search heuristics, CACM, vol. 28, pp. 404-
411, 1985.
[11] Nick Reingold and Jeffery Westbrook, Optimum Off-line Algorithms for the List Updates Problems-Technical Report
YALEU/DCS/TR-805, Yale University, 1-24, 1990.
[12] S. Ben David, A. Borodin and R. Karp, On the Power of Randomization in Online Algorithms- In Algorithmic a, pages 379-386,
1990.
[13] Sandy Irani, Two Results on the List Update Problem-IPL, 38(6):301-306, 1990.
[14] Boris Teia, A lower bound for randomized list updates algorithms- IPL 47:59, August 1993.
[15] Nick Reingold, Jeffery Westbrook, and Daniel D. Sleator,Randomized Competitive Algorithms for the List Update Problem-
algorithmic a, 11:15-32, 1994.
[16] Susanne Albers,Improved Randomized On-Line Algorithms for the List Update Problem- SODA, 412-419, 1995.
[17] Susanne Albers, Bernhard von Stengel and Ralph Werchner.A Combined BIT and TIMESTAMP Algorithm for the List Update
Problem - IPL, 56:135139, 1995.
[18] Rajeev Motwani, Prabhakar Raghavan, Randomized Algoritms -ACM Computing Surveys, 1996.
[19] Allan Borodin and Ran EI-Yaniv, On Randomization in Online Computation-STOC, 1997.
[20] S. Albers and M. Mitzenmacher, Revisiting the COUNTER algorithms List Update-IPL, 64(2):155-160, 1997.
[21] Rakesh Mohanty,Burle Sharma and Sasmita Tripathy, Characterization of Request Sequences for List Accessing
Problem and New Theoretical Results for MTF Algorithm -International Journal of Computer Applications (0975
8887)Volume 22 No.8, May 2011.