An Efficient Implementation Method of Fractal Image Compression on Dynamically Reconfigurable Architecture

Size: px
Start display at page:

Download "An Efficient Implementation Method of Fractal Image Compression on Dynamically Reconfigurable Architecture"

Transcription

1 A Efficiet Implemetatio Method of Fractal Image Compressio o Dyamically Recofigurable Architecture Hidehisa Nagao, Akihiro Matsuura, ad Akira Nagoya NTT Commuicatio Sciece Laboratories 2-4 Hikaridai, Seika-cho, Soraku-gu, Kyoto, , JAPAN fagao, matsuura, agoyag@cslab.kecl.tt.co.jp Abstract. This paper proposes a method for implemetig fractal image compressio o dyamically recofigurable architecture. I the ecodig of this compressio, metric computatios amog image blocks are the most time cosumig. I our method, processig elemets (PEs) cofigured for each image block perform these computatios i a pipelie maer. By cofigurig PEs, we ca reduce the umber of adders, which are the mai computig elemets, by half eve i the worst case. This reductio icreases the umber of PEs that work i parallel. I additio, dyamic recofigurability of hardware is employed to omit useless metric computatios. Experimetal results show that the resources for implemetig the PEs are reduced to 60 to 70% ad the omissio of useless metric computatios reduces the ecodig time to 10 to 55%. 1 Itroductio Due to recet advaces i programmable logic devices such as Field Programmable Gate Arrays (FPGAs), recofigurable computig has become a realistic computig paradigm [1]. Some recofigurable devices have begu to support dyamic ad partial recofiguratio [2][3], ad recet research has made use of such recofigurability to accelerate solvig problems [4]. I this paper, we focus o the acceleratio of fractal image compressio usig dyamically recofigurable computig. Fractal image compressio [5] is expected to be a promisig compressio method for digital images i terms of its high compressio ratios ad fidelity. However, due to the uacceptable ecodig time, use of this compressio method is limited to areas where the ecodig time is ot critical. Therefore, acceleratio of the ecodig is idispesable to a variety of uses. I fractal-based image ecodig, a image is divided ito sub-blocks ad the root mea square metrics amog them are computed. These metric computatios carry the burde i ecodig the etire image because umerous metric computatios for the sub-blocks must be doe. I our method, processig elemets (PEs) are devoted to the correspodig subblocks. Each PE computes the metrics betwee the correspodig sub-blocks ad the cadidate sub-blocks i the pipelie. I each step of the pipelie, oe metric computatio is executed o a PE. I additio, plural PEs implemeted o the recofigurable architecture cocurretly perform the metric computatios. Our method has two advatages owig to the recofigurability of the hardware. Oe advatage is the structure of PEs. Sice each PE is recofigured for a sub-block, a umber of multiplicatios i the metric computatios ca be regarded as costat multiplicatios. This makes it possible to use shifts ad adders istead of variableby-variable geeral-purpose multipliers. By usig costat multiplicatios, the umber

2 of adders eeded for PEs is reduced, eve i the worst case, to half that of PEs i the straightforward implemetatio. This reduces the recofigurable resources eeded for the PE, ad cosequetly icreases the umber of PEs that work i parallel. The secod advatage is the omissio of useless metric computatios. We ca accelerate the ecodig by omittig metric computatios that do ot ifluece the fidelity of the decoded image. Such omissio ca be achieved by the partial recofiguratio of the hardware. Experimetal results show that the resources eeded to implemet the PEs ca be reduced to approximately 60 to 70% of the straightforward implemetatio, eve i the worst case. Results also show that omittig useless computatios reduces the ecodig time to 10 to 55%. Thus, our method utilizig recofigurability sigificatly accelerates the ecodig. This paper is orgaized as follows. Sect. 2 briefly describes fractal image compressio. I Sect. 3, we preset a dyamically recofigurable architecture of the ecoder for fractal image compressio. I Sect. 4, experimetal results are show ad aalyzed. Sect. 5 cocludes this paper. 2 Fractal Image Compressio I this sectio, we describe the outlie of fractal image compressio. A fractal-based image ecodig scheme was first promoted by M. Barsley [6]. The fractal image compressio for grey-scale images was developed by A. Jacqui. For a detailed survey ad extesios of fractal image compressio, we refer readers to a paper by Jacpui [7]. 2.1 Iterated Fuctio System (IFS) Here, we briefly preset the uderlyig mathematical priciples of fractal image compressio based o a theory of IFS [8][9]. A IFS cosists of a collectio of cotractive affie trasformatios fw i : M! Mj1 i mg, where w i maps a metric space M to itself. A trasformatio w is said to be cotractive whe there is a costat umber s(0 s<1) ad d(w(1);w(2)) sd(1;2) holds for ay poits 1;2 2 M, where d(1;2) deotes the S metric betwee 1 ad 2. The collectio of trasformatios defies a map W (S) = i=1 w i(s), where S M. Note that the map W is applied ot m to the set of poits i M but to the set of sub-sets i M. Let W be a cotractive map o a compact metric space of images with the bouded itesity, the the Cotractive Mappig Fixed-Poit Theorem asserts that there is oe special image x W, called the attractor, with the followig properties. 1. W (x W ) = x W : 2. x W = lim!1 W (S0), which is idepedet of the choice of a iitial image S0. Fractal image compressio relies o this theorem. Suppose the attractor of a cotractive map W is the origial image to be compressed. From property 2, the origial image is obtaied from ay iitial image by applyig W. The goal of fractal image compressio is to fid the cotractive map W whose attractor is sufficietly close to the origial image ad to store the parameters of W istead of the itesity values. 2.2 Image Compressio Usig IFS The fractal image compressio algorithm we focus o is based o the quad-tree decompositio scheme [5][8]. This scheme was developed for grey-scale images. Let R1;R2;:::;R p be o-overlappig sub-squares of B 2 B pixels i a image. These sub-squares are called rage blocks. The uio of the set of rage blocks covers

3 the etire image. All 2B 2 2B sub-squares, D1;D2;:::;D q, are called domai blocks, where all of the over-lappig sub-squares of this size are take ito accout. The collectio of all domai blocks is called the domai pool. The map W i Sect. 2.1 maps sub-sets of the domai pool to rage blocks. For each R k, we search for the domai block that approximates R k with the smallest metric out of the domai pool. A rage block that is approximated by a acceptable metric is said to be covered. A rage block for which acceptable domai blocks are ot foud is said to be ucovered. Note that before calculatig metrics, domai blocks are resized to the same size as rage blocks by averagig the itesity values of 222 pixels. Let the pixel itesities of the resized domai block be a1;a2;:::;a ad let those of the rage block be b1;b2;:::;b. The metric R(D P j ;R k ) betwee a domai block D j ad a rage block R k is defied as R(D j ;R k ) = i=1 (sa i + o 0 b i ) 2, where s is the scalig factor ad o is the offset factor. Differetiatig R by s ad o, s ad o that miimize R are calculated as P s = i=1 P P a ib i 0 i=1 ip a i=1 b i i=1 a2 0 (P i i=1 a i) 2 ; o = I this case, R(D j ;R k ) is calculated as X P P i=1 b i 0 s i=1 a i : (1) X R(D j ;R k ) = 1 ( b 2 i 0 ( b i ) 2 ) 0 s2 X i=1 i=1 ( a 2 i 0 ( a i ) 2 ): (2) i=1 i=1 The etire fractal image compressio scheme is show i Fig. 1. We call this algorithm EXAUS. The parameter tolerace settles the compressio ratio ad the fidelity. If a rage block is ucovered, that is, if tolerace is violated for all domai blocks, the rage block is divided ito four smaller rage blocks ad the best-match domais for these smaller rage blocks are searched. I this case, domai blocks with half the size i the side legth are evaluated. To icrease the probability of fidig good rage-domai matches, the domai pool may iclude sub-squares obtaied by rotatig domai blocks 90, 180, 270 ad 360 ad flippig them vertically (eight trasformatios). These sub-blocks are also called domai blocks. After fidig the best matches for all rage blocks, s ad o ad the umber specifyig the best-match domai block are stored for each rage block istead of their pixel itesities; as such, the ecodig is completed. For s ad o, the ecessary bit widths to be preserved are empirically kow to be 5 ad 7, respectively. O the other had, for decodig the image, the correspodig trasformatios are repeated. This iteratio is started from ay iitial image. Iteratios of 10 to 20 times are sufficiet to decode a image with good fidelity. With regard to the computig time, the iteratios i the decodig are ot so troublesome. However, the ecodig time is ofte ot acceptable due to the may iteratios of complex metric computatios. For example, i ecodig a pixel image, the umber of rage blocks of 828 pixels is 1024 ad the umber of domai blocks of pixels is (ot icludig the domai blocks obtaied by rotatig ad flippig). Therefore, the total umber of iteratios is about 60 millio. For reducig the ecodig time, some schemes that try to reduce the umber of rage-domai comparisos have bee proposed [7]. I these schemes, oly rage-domai comparisos amog sub-blocks with the same characteristics are evaluated. Ufortuately, the ecodig times usig these schemes are still uacceptable. I the ext sectio, we propose a method for implemetig fractal image compressio usig parallel computatio o a recofigurable hardware. Our method has two X

4 advatageous features for reducig the ecodig time. The first oe cocers acceleratig the iside of the iermost loop of EXAUS by usig pipelie processig. I each step of the pipelie, oe iteratio is executed P o a PE. P Lookig at the equatios (1) (2), we ca observe that may computatios, i=1 a i, i=1 a2, (P i i=1 a i) 2 P P, i=1 b i, i=1 b2, (P i i=1 b i) 2 P, ( i=1 a2 0 (P i i=1 a i) 2 P ) ad ( i=1 b2 0 (P i i=1 b i) 2 ), ca be performed i advace out of the iermost loop ad have to be doe oly oce for each domai block ad rage block. Therefore, ievitable computatios iside of the iermost loop are other computatios P for s ad R ad comparisos. More precisely, the idispesable burde is the part i=1 a ib i. The method preseted i this paper lightes this burde by executig it i a pipelie. The secod feature cocers reducig the umber of iteratios of metric computatios. I EXAUS, the metric computatios for all pairs of rage ad domai blocks are doe. With regard to the fidelity of the decoded image, it is ot ecessary to evaluate all rage-domai matches. Our scheme omits these useless computatios. This omissio is owig to the dyamic ad partial recofigurability of the hardware. I the ext sectio, we describe these features i detail. mi R = tolerace; For (j = 1 ; j um rage ; j++) f For (k = 1 ; k um domai ; k++) f compute s; if (0 s < 1:0) if (R(D j ;R k ) < mi R) f mi R = R(D j ;R k ); best domai[j] = k; g g if (mi R == tolerace) set R j ucovered ad divide it ito 4 smaller blocks; g 3 Ecoder Architecture Fig. 1. Pseudocode of EXAUS. I this sectio, we propose a ecoder of fractal image compressio implemeted o dyamically recofigurable hardware. I this paper we assume that the dyamically recofigurable hardware is costructed from fie-grai programmable logic elemets (LEs) with a register ad programmable wires amog them such as Xilix XC6200 series FPGAs [2] or Atmel AT40K FPGAs [3]. We also suppose that these LEs ad wires ca be cofigured by settig cofiguratio data dyamically ad partially. Some kid of architectures of LEs have bee proposed such as Look-Up-Table (LUT) based architectures, multiplexer based architectures ad others. However, geeralizig these LEs as oly programmable logic fuctio uits with limited iputs ad a output, for example, 3 or 4 iputs, we cosider the ecoder architecture idepedet from the architectures of LEs ad realized as wired logic of LEs. 3.1 A Pipelied PE Network Fig. 2 shows the overview of the proposed ecoder implemeted o dyamically recofigurable hardware. The PE performs computatios iside the iermost loop of EXAUS. Each PE is devoted to a give rage block ad fids the best-match domai amog all domai blocks that are give through the data path i pipelie. I each step of the pipelie, oe iteratio of the iside of the iermost loop is executed o each PE. After fidig the best match, the PE iforms the best-match domai to the cotrol uit. The, the PE is recofigured for aother rage block with the cofiguratio data give

5 GRPDLQXQLW GRPDLQ GDWD FRQWUROXQLW cofiguratio data best-match domai EXIIHU 3( EXIIHU 3( EXIIHU 3( Y Dyamically recofigurable hardware GDWDSDWK FRQWUROSDWK Fig. 2. Overview of the Ecoder. by the cotrol uit. These PEs are recofigured util o ucovered rage block exists. All PEs are coected by the data path ad perform the calculatios i a pipelie maer while trasferrig the domai data. The domai uit iputs the domai data ito the PE etwork util all rage blocks are checked agaist all domai blocks. A buffer trasfers domai data to the PE coected with it ad the eighborig buffer through the data path without the pipelie stole durig the recofiguratio of that PE. 3.2 Dyamically Recofigurable PE Here, we describe the PE architecture i detail. A PE performs the calculatios iside of the iermost loop of EXAUS. As stated i Sect. 2.2, the computatio P P of i=1 a ib i is the burde for computig R. Therefore, it is desirable that i=1 a ib i is calculated i parallel. The basic implemetatio is show i Fig. 3. The parameters a1;a2;:::;a are eter the PE i parallel P P ad i=1 a ib i is calculated i the pipelie. The hardware compoet for calculatig i=1 a ib i is deoted by P1. The hardware compoet for calculatig s, o ad R is deoted by P2. P2 fids the miimum R ad stores the idetity umber of the domai block that provides it. These computatios are also performed i the pipelie. I each step of the pipelie, oe iteratio of the iside of the iermost loop P Pis completed o a PE. Precomputable parameters for the domai block, such as i=1 a i, i=1 a2 i ad others, are give to the PEs through the data path i parallel cooperatig with the pipelie. The other precomputable parameters for the rage block are stored i P2. I order to implemet P1, we eed multipliers ad 0 1 adders. O the other had, the computatios performed i P2 are three multiplicatios, three comparisos, ad oe divisio. Sice the hardware resources eeded for P2 ad the buffer are much smaller tha those for P1, it is importat to reduce the hardware resources for P1 for total resource reductio. By reducig the resources for a PE, we ca implemet may PEs at the same time ad icrease the umber of rage blocks processed i parallel. Now, we describe a efficiet implemetatio method usig recofigurability. Note that the multipliers i P1 i Fig. 3 are implemeted with adders ad shifts. Sice shifts are implemeted by wirig o recofigurable devices, it is importat to reduce the umber of adders. Therefore, we implemet P1 as follows. Let the iteger b i be preseted as b i;l b i;l01 111b i;1 i the biary presetatio, where b i;j is 0 or 1, ad let the bit width of a i s ad b i s be l. The, multiplicatio a i b i is preseted as a i b i = f(a i b i;l ) (l 0 1)g +f(a i b i;l02 ) (l 0 2)g +111+fa i b i;1g, where a j deotes the j-bit shift of a to the left. The multiplicatio is implemeted by l 0 1 adders. I this case, the umber of adders for computig P i=1 a ib i at P1 is (l 0 1) +( 0 1) = l0 1: (3) O the other had, i the case of recofigurig a PE for a rage block, we ca make use of the fact that b i;j is a costat. Namely, we ca get rid of the part (a i b i;j ) if b i;j is 0.

6 D D Q D Q D D D D Q D D ' M data path precomputable parameters E E E Q Q D L E L L 3 3 3( First, we rearrage P i=1 a ib i as follows. X Fig. 3. PE architecture. a i b i = f(a1b1;1 + a2b2; a b ;1)g i=1 + f(a1b1;2 + a2b2; a b ;2) 1g f(a1b1;j + a2b2;j a b ;j ) (j 0 1)g f(a1b1;l + a2b2;l a b ;l ) (l 0 1)g: (4) The term of the j-th row of (4), (a1b1;j + a2b2;j a b ;j ); (5) ca be computed i a differet way by ivertig b i;j s for all i, 1 i, as follows. X a i 0 (a1b1;j + a2b2;j a b ;j ): (6) i=1 If the umber of o-zero bits amog b1;j;b2;j;:::;b ;j is more tha 2, we cofigure P1 usig (6) istead of (5). This is doe for all j. The, the umber of adders eeded to implemet P1 is l (7) i the worst case. Therefore, the umber of adders is reduced at least by half. The worst case happes whe the umber of o-zero bits of b1;j;b2;j;:::;b ;j is 2 or 2 +1 for all j(1 j l). I practice, sice b i s (1 i ) are itesities of a sub-block of a digital image, b i;j s (1 i ) ted to be the same, especially whe j is close to l. Therefore, the worst case rarely happes ad the umber of adders is expected to be much smaller tha that of the worst case. I Sect. 4, the scheme s experimetal results showp the reductio of adders ad resources for the PE. i=1 a ib i discussed here ca be implemeted by distributed arithmetic (DA) usig memories [10], if LEs are LUT based ad ca be used as memories. This implemetatio ca be space efficiet. However, the space efficiecy is terribly affected by the umber of iputs, M, of LEs (i.e., the umber of cotet bits possible for a LUT). Whe M is 3, the DA implemetatio is ot comparable eve with the our worst case implemetatio for practical ad l. I additio, the DA implemetatio is limited to LUT based architectures. Therefore, we would ot adopt the DA implemetatio.

7 3.3 A Compressio Algorithm Usig Dyamic Recofiguratio Next, we describe the improvemet of EXAUS. We use the dyamic partial recofigurability of the pipelied PE etwork stated i Sect I this PE etwork, each PE ca be recofigured without the pipelie stole sice buffers trasfer the domai data. Therefore, all PEs do ot have to be recofigured at the same time. I EXAUS, all domai blocks are checked for each rage block. However, by choosig the appropriate tolerace ad fidig oly oe rage-domai match that accepts the tolerace for each rage block, we ca obtai a decoded image with sufficietly good fidelity. Geerally, the fidelity of the decoded image is evaluated with the sigal-to-oise ratio (SNR) defied as SNR = 10 log10 (dr(s)2 =d e (S;S 0 )) (db). Here, dr(s) is the dyamic rage of the origial image S ad d e (S;S 0 ) is P the metric betwee S ad the decoded image S 0. d e (S;S 0 ) is defied as d e (S;S 0 t ) = i=1 ( i 0 0 )2 i, where i s ad 0 s are pixel itesities of S ad i S0.ASNR of approximately 28 to 32 db is sufficiet for fie fidelity. Now, we preset the improved algorithm that omits the exhaustive rage-domai matches i Fig. 4. We call this algorithm OMIT. This improvemet ca be implemeted o hardware by dyamically ad partially recofigurig each PE as soo as the first acceptable rage-domai match is foud. For (j = 1 ; j um rage ; j++) f flag = 0; For (k = 1 ; k um domai ; k++) f compute s; if (0 s < 1:0) if (R(D j ;R k ) < tolerace) f best domai[j] = k; flag = 1; break; g g if (flag == 0) set R j ucovered ad divide it ito 4 smaller blocks; g 4 Experimets Fig. 4. Pseudocode of OMIT. 4.1 Resources for PE First, we evaluate the umber of adders eeded to implemet a P1 ad the resources for PEs. Table 1 shows the umber of adders eeded to implemet P1 whe the rage size is 424 pixels ad 828 pixels for two bechmark images, Girl ( pixels, 8 b/p) of SIDBA ad Lea ( pixels, 8 b/p). NO-RECONF deotes the umber of adders eeded to implemet a P1 without usig recofigurability. WORST of RECONF Table 1. Number of adders. Rage size NO- RECONF (pixels) RECONF WORST AVERAGE Girl Lea (49.9%) 150 (29.3%) 136 (26.6%) (49.6%) 36 (28.3%) 29 (22.8%)

8 Table 2. Number of LEs for a PE Rage size NO- RECONF (pixels) RECONF WORST AVERAGE Girl Lea (62.2%) 4674 (44.4%) 4642 (44.1%) (73.3%) 2109 (59.7%) 2057 (58.1%) deotes the umber of adders usig recofigurability i the worst case ad its ratio to that of NO-RECONF. The values of WORST are calculated by (7) ad those of NO- RECONF is calculated by (3). AVERAGE of RECONF deotes the umber of adders i the average case usig recofigurability. Table 1 shows that the umber of adders is sigificatly reduced by utilizig recofigurability. Table 2 shows the total umber of LEs eeded for the PE. Agai, NO-RECONF deotes the umber of LEs for a PE implemeted without usig recofigurability. WORST of RECONF deotes the umber of LEs i the worst case usig recofigurability ad its ratio to the umber of NO-RECONF. AVERAGE of RECONF deotes these average umbers usig recofigurability. Here, we assume that a LE is a LUT with four iputs ad a output. Carry save adders are used for the adders for P1. The fial summatio ad the carry vector provided by these carry save adders is added by a carry look ahead adder at the ed. Therefore, oe carry look ahead adder is implemeted i P1. We evaluated the umber of LEs by coutig 1-bit full adders eeded for carry save adders of P1 ad assumig that a 1-bit full adder is implemeted with two LEs. Altera FPGA mappig tool MAX+Plus II was used to evaluate the umber of LEs for P2 ad the carry look ahead adder. The umber of LEs for P2 is 1556 whe the rage-size is 828, ad 1343 whe the rage-size is 424. Table 2 idicates that the value of WORST is approximately 60% of that of NO- RECONF whe the rage-size is 828. Whe the rage-size is 424, the ratio is approximately 70%. These reductios are importat for implemetig may PEs uder the resource limitatio to accelerate the ecodig. Although further ivestigatios for dyamic allocatio of PEs are eeded, the average case suggests that dyamically chagig the umber of PEs ad makig full use of limited resources is promisig. 4.2 Efficiecy of The Improved Algorithm Here, to cofirm the efficiecy of OMIT, we evaluate the umber of iteratios of the iside of the iermost loop by computer simulatio. The umbers of iteratio for EX- AUS ad OMIT are compared uder the same SNRs for Girl ad Lea. SNRs are evaluated with the decoded images obtaied after 20 iteratios of the mappig. The image was divided ito 828-size rage blocks at the begiig. Ucovered rage blocks were divided ito four 424-size rage blocks. Domai blocks obtaied by rotatig ad flippig are ot icluded i the domai pool. We evaluated the summatio of iteratios for 828 ad 424-size rage blocks. I each step i our pipelied PE etwork, a domai block is iputted to the etwork. Therefore, the umber we evaluated idicates the ecodig time whe oe PE is implemeted. Fig. 5 shows the evaluated values for Girl ad Lea. For Girl, the values for OMIT are from 55% to 70% of EXAUS whe the SNR is from 28 to 30 db. For Lea, these ratios are from 10% to 30%. Note that for Lea, o 828-size rage block is divided i EXAUS whe the SNR is 30 db. Therefore, the SNR does ot fall to less tha 30 db, ad the umber of iteratios caot be reduced more. The ratios for Lea are give by comparig the values of OMIT ad the miimum value of

9 iteratio umber (x10 6 ) iteratio umber (x10 6 ) EXAUS OMIT Girl SNR(dB) EXAUS OMIT Lea SNR(dB) Fig. 5. Number of iteratios EXAUS. As a result, the improvemet of the algorithm reduces the ecodig times for these images to 10 to 55% with fie fidelity. 5 Coclusio I this paper, we have proposed a method for implemetig fractal image compressio o a dyamically recofigurable architecture. I our method, PEs are specialized for image blocks ad cocurretly perform the computatios i a pipelie maer. Furthermore, plural PEs work i parallel. By usig the recofigurability, the recofigurable resources eeded for each PE is reduced to 60% to 70% of that of the straightforward implemetatio i the worst case. This reductio is quite importat for implemetig may PEs uder the resource limitatio i order to accelerate the ecodig. I additio, a improved fractal image compressio algorithm omittig useless computatios, which ca be achieved by dyamic ad partial recofigurability, ca reduce the ecodig time to 10 to 55%. As a result, by applyig these utilizatio of the recofigurability to the proposed pipelied PE etwork, the ecodig time of the PE etwork ca be sigificatly reduced uder the recofigurable resource limitatios. I future works, we pla to implemet the preseted ecoder ad cofirm the effectiveess of the preseted PE etwork i practice. Refereces 1. T. Miyazaki, Recofigurable Systems: A Survey, Proc. of ASP-DAC 98, pp , Feb Xilix, XC6200 Field Programmable Gate Arrays, Apr Atmel, AT40K FPGAs, Dec, J. R. Koza, F. H. Beett III, J. L. Hutchigs, S. L. Bade, M. A. Keae, ad D. Adre, Evolvig Computer Programs usig Rapidly Recofigurable Field-Programmable Gate Arrays, Proc. of FPGA 98, pp , Feb Y. Fisher (Ed.), Fractal Image Compressio: Theory ad Applicatio, Spriger, M. F. Barsley, V. Ervi, D. Hardi, ad J. Lacaster, Solutio of a Iverse Problem for Fractals ad Other Sets, Proc. of Natl. Acad. Sci USA, 83: , Apr A. E. Jacqui, Fractal Image Codig: A Review, Proc. of the IEEE, vol. 81, o. 10, pp , Oct Y. Fisher, Fractal Image Compressio, SIGGRAPH Course Notes, M. F. Barsley, Fractals Everywhere, AK Peters, S. A. White, Applicatios of Distributed Arithmetic to Digital Sigal Processig: A Tutorial Review, IEEE ASSP Magazie, pp. 4 19, July

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali

More information

Behavioral Modeling in Verilog

Behavioral Modeling in Verilog Behavioral Modelig i Verilog COE 202 Digital Logic Desig Dr. Muhamed Mudawar Kig Fahd Uiversity of Petroleum ad Mierals Presetatio Outlie Itroductio to Dataflow ad Behavioral Modelig Verilog Operators

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Efficient Hough transform on the FPGA using DSP slices and block RAMs

Efficient Hough transform on the FPGA using DSP slices and block RAMs Efficiet Hough trasform o the FPGA usig DSP slices ad block RAMs Xi Zhou, Norihiro Tomagou, Yasuaki Ito, ad Koji Nakao Departmet of Iformatio Egieerig Hiroshima Uiversity Kagamiyama 1-4-1, Higashi Hiroshima,

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

The following algorithms have been tested as a method of converting an I.F. from 16 to 512 MHz to 31 real 16 MHz USB channels:

The following algorithms have been tested as a method of converting an I.F. from 16 to 512 MHz to 31 real 16 MHz USB channels: DBE Memo#1 MARK 5 MEMO #18 MASSACHUSETTS INSTITUTE OF TECHNOLOGY HAYSTACK OBSERVATORY WESTFORD, MASSACHUSETTS 1886 November 19, 24 Telephoe: 978-692-4764 Fax: 781-981-59 To: From: Mark 5 Developmet Group

More information

Civil Engineering Computation

Civil Engineering Computation Civil Egieerig Computatio Fidig Roots of No-Liear Equatios March 14, 1945 World War II The R.A.F. first operatioal use of the Grad Slam bomb, Bielefeld, Germay. Cotets 2 Root basics Excel solver Newto-Raphso

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Intro to Scientific Computing: Solutions

Intro to Scientific Computing: Solutions Itro to Scietific Computig: Solutios Dr. David M. Goulet. How may steps does it take to separate 3 objects ito groups of 4? We start with 5 objects ad apply 3 steps of the algorithm to reduce the pile

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset

More information

Homework 1 Solutions MA 522 Fall 2017

Homework 1 Solutions MA 522 Fall 2017 Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Automatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL

Automatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL Automatic Geeratio of Polyomial-Basis Multipliers i GF (2 ) usig Recursive VHDL J. Nelso, G. Lai, A. Teca Abstract Multiplicatio i GF (2 ) is very commoly used i the fields of cryptography ad error correctig

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual) Wavelet Trasform CSE 49 G Itroductio to Data Compressio Witer 6 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter

More information

Analysis of Algorithms

Analysis of Algorithms Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms

More information

Outline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions

Outline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions FFT Circuit Desig Outlie Applicatios of FFT i Commuicatios Fudametal FFT Algorithms FFT Circuit Desig Architectures Coclusios DAB Receiver Tuer OFDM Demodulator Chael Decoder Mpeg Audio Decoder 56/5/ 4/48

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Algorithm. Counting Sort Analysis of Algorithms

Algorithm. Counting Sort Analysis of Algorithms Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information