Professional Documents
Culture Documents
Advanced Computer Architecture (MS1101: 1. Big-O Notation
Advanced Computer Architecture (MS1101: 1. Big-O Notation
Hardware security protects the machine and peripheral hardware from theft and from electronic
intrusion and damage. This comes in the form of a physical device rather than software that's installed
on the hardware of a computer system.
Some of the most common examples of hardware security are hardware firewalls, scanning devices,
proxy servers, etc
One of the primary importance of hardware security is, less accessibility compared to software that
might be vulnerable to the entire world of hackers. The attackers may not easily understand the security
built on the premise.
Security in hardware offers performance and power consumption advantages over its software
equivalents.
◼ Increasing amounts of data being processed and the complexity of encryption algorithms slows down
security implementations severely.
Time efficiency is one of the factors considered while analyzing the algorithm. It determines the amount
of time taken by an algorithm to run.
The efficiency can be measured by computing time complexity of each algorithm and this can be well
represented by using asymptotic notations.
1. Big-O notation
The above expression can be described as a function f(n) belongs to the set O(g(n)) if there exists a
positive constant c such that it lies between 0 and cg(n), for sufficiently large n.
For any value of n, the running time of an algorithm does not cross the time provided by O(g(n)).
Since it gives the worst-case running time of an algorithm, it is widely used to analyze an algorithm as
we are always interested in the worst-case scenario.
2. Omega notation
It is denoted by Ω.This notation is used to represent the lower bound of algorithm’s running time.
Thus, it provides the best case complexity of an algorithm.
The above expression can be described as a function f(n) belongs to the set Ω(g(n)) if there exists a
positive constant c such that it lies above cg(n), for sufficiently large n.
For any value of n, the minimum time required by the algorithm is given by Omega Ω(g(n)).
3. Theta Notation
It is denoted by Θ. This method represents the upper bound and the lower bound of the running
time. It is used for analyzing the average-case complexity of an algorithm.
The above expression can be described as a function f(n) belongs to the set Θ(g(n)) if there exist positive
constants c1 and c2 such that it can be sandwiched between c1g(n) and c2g(n), for sufficiently large n.
If a function f(n) lies anywhere in between c1g(n) and c2g(n) for all n ≥ n0, then f(n) is said to be
asymptotically tight bound.
1. It is used to remove the duplicate data and database anomalies from the relational table.
2. Normalization helps to reduce redundancy and complexity by examining new data types
used in the table.
3. It is helpful to divide the large database table into smaller tables and link them using
relationship.
4. It avoids duplicate data or no repeating groups into a table.
5. It reduces the chances for anomalies to occur in a database.
You have been selected to educate a group officials regarding learning how to listen whenever there is
any communication on the current economic criss. Briefly explain why it is important to be a good
listener?