Skip to main content

RETRACTED CHAPTER: Conditions of Deadlock Detection in Multithreaded Applications Using Inheritable Systems

  • Conference paper
  • First Online:
  • 826 Accesses

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 3))

Abstract

Normally deadlock is the common situation of multithreaded applications; it causes longer memory access time, page table memory utilization, and internal fragmentation. Due to these reasons, it takes more memory spaces, more access time, redundancy of process and etc., Most of the papers resolved the deadlocks using Cyclic Graphs, NP Complete, Banking Algorithms, Resource Allocation Method and several type of algorithms are implemented. We implemented with new approach of Fitness Program and Hereditary Programming concepts resolve the deadlock detection in multithreaded applications. This paper attempted to create a suitable and substantial simultaneity control program by utilizing Hereditary Programming (HP). In HP, a program is spoken to with a tree, by utilizing shared control factors; a proper program could be created. In any case invalid simultaneity control program has been generated. This paper enhances the simultaneity control program age framework all together that the program created can identify deadlock and can execute any system. We used Gridlock detection and evaluation of program authenticity for deadlock detects ions. It is tentatively demonstrated that a fitting simultaneity control program can effectively be produced by utilizing the proposed technique.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Change history

  • 11 April 2024

    A correction has been published.

References

  1. Stonebraker M, Etintemel U (2005) One size fits all: an idea whose time has come and gone. In: Procedure of the 21st international conference on data engineering, pp 2–11

    Google Scholar 

  2. Seltzer M (2008) Beyond relational databases. Commun ACM 51(7):52–58

    Google Scholar 

  3. Silberchatz A, Korth H, Sudharsan S (2002) Database system concepts. McGraw-Hill, New York

    Google Scholar 

  4. Tamura S, Hochin T, Nomiya H (2011) Generation method of concurrency control program by using hereditary programming. In: Procedure of 12th ACIS international conference on software engineering, artificial intelligence, networking and parallel distributed computing, pp 175–180

    Google Scholar 

  5. Tamura S, Hochin T, Nomiya H (2012) Generation of semantic concurrency control program by using Hereditary programming. In: 1st international symposium innovative e-services and information systems, pp 289–294

    Google Scholar 

  6. Tamura S, Hochin T, Nomiya H (2012) Concurrency control program generation by decreasing nodes of program trees in hereditary programming. In: IEEE international conference on systems, man and cybernetics, pp 1023–1028

    Google Scholar 

  7. Tamura S, Hochin T, Nomiya H (2014) Concurrency control program generation by extending nodes in hereditary programming. In: International conference software engineering research management and applications, pp 732–778

    Google Scholar 

  8. Affenzeller M, Winkler S, Wagner S (2009) Hereditary algorithms and hereditary programming: modern concepts and practical applications. CRC Press, Boca Raton

    Google Scholar 

  9. Paul ITK, Hasegawas Y (2010) Applied hereditary programming and machine learning. CRC Press, Boca Raton

    Google Scholar 

  10. Elmasri R, Navathe SB (2000) Fundamentals of database systems, 3rd edn. Addison Wesley, Boston, pp 669–672

    Google Scholar 

  11. Jones T, Ostrouchov G, Koenig GA, Mondragon OH, Bridges PG (2017) An evaluation of the state of time synchronization on leadership class supercomputers. Concurr Comput Pract Exp, 9 October 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Mohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohan, A., Komal Kumar, N. (2020). RETRACTED CHAPTER: Conditions of Deadlock Detection in Multithreaded Applications Using Inheritable Systems. In: Satapathy, S.C., Raju, K.S., Shyamala, K., Krishna, D.R., Favorskaya, M.N. (eds) Advances in Decision Sciences, Image Processing, Security and Computer Vision. ICETE 2019. Learning and Analytics in Intelligent Systems, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-030-24322-7_16

Download citation

Publish with us

Policies and ethics