University of Waterloo CS240 Winter 2018 Assignment 4 Due Date: Wednesday, Mar. 14th, at 5pm

Size: px
Start display at page:

Download "University of Waterloo CS240 Winter 2018 Assignment 4 Due Date: Wednesday, Mar. 14th, at 5pm"

Transcription

1 Univesit of Wateloo CS Winte Assinment Due Date: Wednesda, Ma. th, at pm vesion: -- : Please ead the uidelines on sumissions: ~cs//uidelines.pdf. This assinment contains itten questions and a poammin question. Sumit ou itten solutions electonicall as a PDF ith the file named ap.pdf usin MakUs. We ill also accept individual question files named aq.pdf, aq.pdf,..., aq.pdf if ou ish to sumit questions as ou complete them. Fo Question, sumit ou files quadteecompession.h and quadteecompession.cpp ased on the skeleton files povided on the e pae. Polem [++ maks] a) Give the contents of the hash tale that esults hen ou inset items ith the kes I, E, A, T, P, R, S, L, Y, G in that ode into an initiall empt tale of size M =. Use doule hashin, ith the hash functions iven elo: c A E G I L P R S T Y ASCII(c) h (c) = ASCII(c) mod h (c)=(( ASCII(c)) mod )+ 9 Fo full cedit it suffices to ive the final coect anse, ut e ecommend shoin some intemediate aas to have a chance of pat-maks in case of eos. ) Find one chaacte c {A,..., Z} that is diffeent fom all the ones in pat (a) such that insetin c into ou esult fom pat (a) ith the same hash-function ould lead to failue to inset (i.e., to e-hashin). Biefl justif ou anse. Hint: Make use of the fact that the tale-size M is not ell-chosen fo doule-hashin. c) Suppose ou have an implementation of doule-hashin (not ith the aove hashin functions). Unfotunatel thee is a u in ou doule-hashin code such that one o oth of the hash functions alas etun the same value x >. Descie hat happens in each of these situations: (i) h has the u, (ii) h has the u, (iii) oth h and h have us.

2 You should comment on hat the esultin poe sequence ill e and ho lon ou ould expect that an Inset ill take. (You need not pove the un-time of Inset fomall, ut compae its ehaviou to hashin methods that e have seen in class.) You ma assume that M and the hashin-functions ae suitale fo doule-hashin. In paticula the load facto α is kept small (α < ), M is a pime, h (k) {,..., M }, and h and h hash unifoml if the don t have us. Polem [++ maks] a) Give the contents of the hash tale that esults hen ou inset items ith the kes I, E, A, T, P, R, S, L, Y, G in that ode into an initiall empt tale of size M =, usin cuckoo hashin and the folloin hash functions (h is the same as in the pevious question): c A E G I L P R S T Y ASCII(c) h (c) = ASCII(c) mod h (c) = ( ASCII(c)) mod 7 Fo full cedit it suffices to ive the final coect anse, ut e ecommend shoin some intemediate aas to have a chance of pat-maks in case of eos. ) Find one chaacte c {A,..., Z} that is diffeent fom all the ones in pat (a) such that insetin c into ou esult fom pat (a) ith the same hash-function ould lead to failue to inset (i.e., to e-hashin). (The chaacte need not e the same one as in Q().) Biefl justif ou anse. c) Suppose that ou find that ou hash tale contains the folloin items: 7 9 S I L E R G Y A T P You kno that this hash tale as otained insetin the kes ith the aove hash functions h and h. You also kno that no othe ke as eve inseted, and no ke as eve deleted. But ou do not kno in hich ode the insetions happened. Give thee distinct easons (involvin diffeent kes) h this hash tale could not possil have een otained via cuckoo hashin, no matte hat the insetion ode as. Polem [++ maks] a) Conside the set of points in Fiue. Da the coespondin kd-tee, folloin the conventions fom the couse slides, and statin splittin alon a suitale x-coodinate. You should sho oth the splittin lines that ae inseted into the pictue and the coespondin tee.

3 9 7 p p p p p 9 p p p p p p p A p p 7 p p 7 9 Fiue : A set of points, and the que-ectanle A. ) Pefom a ane-que fo the ectanle A indicated in Fiue, hich is ectanle [.,.7] [, ] (folloin the pseudo-code on Module slide ). You should sho ho the alothm opeates indicatin (in the tee that ou ceated in pat (a)) all nodes v such that kdtee-raneseach(v, A) as called on v. (We call such a node a a node.) c) Define a point set P fo n = k as follos: P = {p,..., p n }, and fo l =,..., n p l has -coodinate l If l = i n + j, then p l has x-coodinate j n + i. (Fiue ives the point-set fo k =.) Sho that thee exists a que ectanle A such that no point of P lies in A, ut thee ae Ω( n) a nodes duin the ane-que fo A. (Motivation: Slide of module aued that the nume of a nodes is O( n), so the pupose of this assinment is to aue that this ound is tiht. You do not need to kno the poof of the O( n) ound to do this assinment.) Polem [7 maks] We ae iven a set W of n of indos on the compute sceen S (i.e., axis-paallel ectanles in the plane). A ne indo pops up and e ish to find all indos in W that ae completel coveed the ne indo. Give an aloithm that finds all these indos in O((lo n) c + s) time, hee s is the nume of indos that ae found, and c is a constant. The modules have not een finalized et and slide-numes ma chane ±.

4 Fomall, each indo is descied via a -tuple (x l, x,, t ) ith x l < x and < t, hich coesponds to the ectanle [x l, x ] [, t ]. If the ne indo is W = (x l, x,, t), ou que should etun in O((lo n) c ) time all those indos W = (x l, x,, t ) in W that satisf [x l, x ] [x l, x ] and [, t ] [, t]. To make this possile, ou ill need to assume that W is stoed in a suitale data stuctue. Descie hat ou ae usin. This data stuctue should take at most O(n lo c n) space, and one should e ale to uild it in O(n lo c n) time. Polem [+(+) maks] One of the applications of quadtees is compession of pictues. The pictue is ecusivel divided in quadants until the entie quadant is of the same colou. a) (Witten) Usin this ule, ive the quad-tee that epesents the eion [, ) [, ) of the fiue iven elo. To explain the dain conventions, e ive ou elo the quad-tee fo the eion [, ) [, ) of the fiue. (You ma omit laels NE, NW, etc., especiall nea leaves.) An unlaelled pixel is hite ( ). [,) [,) l l ) (Poammin) l l l [,) [,) NE NW [,) [,) [,) [,) Wite a poam that convets a iven (lack-and-hite) pictue into a quadtee that epesents it as descied in pat (a), and vice vesa. (Details ae elo.) c) (Bonus) Comment on the effectiveness of this method of compessin pictues. To suppot ou auments, povide expeimental esults (usin ou on implementation) that compae A and T fo vaious pictues. Comin up ith methods of eneatin pictues and hat values of n to test ae pat of the question.

5 Details: On the e pae, ou ill find a stu-file quadteecompession.h and quadteecompession. Implement stin * aatotee(int n, int * A). Hee n is a poe of, aa A has size n and each ent is o. The function etuns a efeence to a stin of a quad-tee that epesents the same pictue. Implement int * teetoaa(int n, stin * T). Hee n is a poe of, T is the stin of a quad-tee that stoes a pictue of size n n, hee all leaves ae o. The function etuns an aa that epesents the same pictue. A -aa A[..n ] stoes a lack-and-hite pictue as follos: Fo x, < n, ent A[indexOf(n, x, )] stoes the colo of the pixel hose ottom-left cone is (x, ), Hee indexof is a function povided in the stu. We use the convention that epesents hite and epesents lack. A stin T epesents a quadtee havin a chaacte fo each node in pe-ode. A chaacte i means an intenal node, a chaacte means a leaf that is lack and a chaacte means a leaf that is hite. Stin T lists the nodes in pe-ode, i.e., it fist has the chaacte of the oot, then ecusivel the chaactes of the NE-child, the chaactes of the NW-child, the chaactes of the -child, and the chaactes of the -child. Fo example, if n =, then T = (i,, i, i,,,,,,,,, ) epesents the folloin quad-tee (and pictue): [, ) [, ) 7 NE NW lack [, ) [, ) lack hite lack hite [, ) [, ) lack hite hite lack hite With the aove conventions and fo fixed n, one can aue that an aa A detemines a unique stin T and vice vesa (ou need not pove this). Fiuin out ho to do the convesion eteen them is pat of ou assinment. The stus contain #ifndef SCRIPTS and #endif at vaious places. Do not emove these. Anthin that is suounded #ifndef SCRIPTS and #endif ill not e tanslated ou testin scipts, and ou can add testin-outines ithin them. The stu-file contains some pintin outines that ou ma use, ut do not have to use. You can add othe functions as ou see fit. You should not use (o need) an liaies eond the ones povided in the stu-files. 7

EE 168 Handout #32 Introduction to Digital Image Processing March 7, 2012 HOMEWORK 7 SOLUTIONS

EE 168 Handout #32 Introduction to Digital Image Processing March 7, 2012 HOMEWORK 7 SOLUTIONS EE 168 Handout #32 Intoduction to Diital Imae Pocessin Mach 7, 2012 HOMEWORK 7 SOLUTIONS Polem 1: Colo Wheels We can epesent an N x N colo imae y a thee-dimensional aay such that the fist two dimensions

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Spin Semeste, 2011 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 4 Assined: Monda, Fe 28, 2011 Due: Monda, Ma 7, 2011 Total value: 100 points (+ 5 onus points). Penalt of 20 points

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Fall Semeste, 2014 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 5 Assined: Wednesda, Octoe 29th, 2014 Due: Wednesda, Nov 12th, 2014 (Wednesda, Nov 5th, 2014 poess epot due). Total

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

SORTING IN SPACE HANAN SAMET

SORTING IN SPACE HANAN SAMET SORTING IN SPACE HANAN SAMET COMPUTER SCIENCE DEPARTMENT AND CENTER FOR AUTOMATION RESEARCH AND INSTITUTE FOR ADVANCED COMPUTER STUDIES UNIVERSITY OF MARYLAND COLLEGE PARK, MARYLAND 074-4 USA e mail: hjs@cs.umd.edu

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

2D Transformations. Why Transformations. Translation 4/17/2009

2D Transformations. Why Transformations. Translation 4/17/2009 4/7/9 D Tansfomations Wh Tansfomations Coodinate sstem tansfomations Placing objects in the wold Move/animate the camea fo navigation Dawing hieachical chaactes Animation Tanslation + d 5,4 + d,3 d 4,

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET

ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET COMPUTER SCIENCE DEPARTMENT AND CENTER FOR AUTOMATION RESEARCH AND INSTITUTE FOR ADVANCED COMPUTER STUDIES UNIVERSITY OF

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Prof. Feng Liu. Fall /17/2016

Prof. Feng Liu. Fall /17/2016 Pof. Feng Liu Fall 26 http://www.cs.pdx.edu/~fliu/couses/cs447/ /7/26 Last time Compositing NPR 3D Gaphics Toolkits Tansfomations 2 Today 3D Tansfomations The Viewing Pipeline Mid-tem: in class, Nov. 2

More information

COMPARISON OF THREE COLOUR SPACES IN SKIN DETECTION. Chelsia Amy Doukim, Jamal Ahmed Dargham & Ali Chekima

COMPARISON OF THREE COLOUR SPACES IN SKIN DETECTION. Chelsia Amy Doukim, Jamal Ahmed Dargham & Ali Chekima ONEO SCIENCE 24: MACH 2009 COMPAISON OF THEE COLOU SPACES IN SKIN DETECTION School of Enineein & Infomation Technolo Univesiti Malasia Saah 88999 Kota Kinaalu Saah Malasia ASTACT. Skin detection is used

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Tufts University Math 13 Department of Mathematics November 14, :00 noon to 1:20 pm

Tufts University Math 13 Department of Mathematics November 14, :00 noon to 1:20 pm Tufts Univesit Math 3 Depatment of Mathematics Novembe, Eam : noon to : pm Instuctions: No calculatos, notes o books ae allowed. Unless othewise stated, ou must show all wok to eceive full cedit. Simplif

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Goal. Rendering Complex Scenes on Mobile Terminals or on the web. Rendering on Mobile Terminals. Rendering on Mobile Terminals. Walking through images

Goal. Rendering Complex Scenes on Mobile Terminals or on the web. Rendering on Mobile Terminals. Rendering on Mobile Terminals. Walking through images Goal Walking though s -------------------------------------------- Kadi Bouatouch IRISA Univesité de Rennes I, Fance Rendeing Comple Scenes on Mobile Teminals o on the web Rendeing on Mobile Teminals Rendeing

More information

GARBAGE COLLECTION METHODS. Hanan Samet

GARBAGE COLLECTION METHODS. Hanan Samet gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

CAM I/O Scheduler. Netflix, Inc. AsiaBSDCon 2015

CAM I/O Scheduler. Netflix, Inc. AsiaBSDCon 2015 CAM I/O Schedule ワーナーラーシュ フーメー Netflix, Inc. AsiaBSDCon 2015 東京 2015 年 4 月 15 日 http://people.feebsd.og/~imp/asiabsdcon2015/iosched-slides.pdf http://people.feebsd.og/~imp/asiabsdcon2015/pape.pdf Outline

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

High Performance Computing on GPU for Electromagnetic Logging

High Performance Computing on GPU for Electromagnetic Logging Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and

More information

Cache Memory and Performance

Cache Memory and Performance Cache Memo and Pefomance Code and Caches 1 Man of the following slides ae taken with pemission fom Complete Powepoint Lectue Notes fo Compute Sstems: A Pogamme's Pespective (CS:APP) Randal E. Bant and

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4)

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4) PU Stuctue and Function h Geneal Oganisation Registes Instuction ycle Pipelining anch Pediction Inteupts Use Visible Registes Vaies fom one achitectue to anothe Geneal pupose egiste (GPR) ata, addess,

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

t [ Background removed

t [ Background removed HANDS-ON > HOE1 Taining 1 Pictues You decide to ceate a memoies slide show fo you siste and he husband, who wee ecently maied. You include thei high school Sweetheat Ball image, engagement and wedding

More information

Color Interpolation for Single CCD Color Camera

Color Interpolation for Single CCD Color Camera Colo Intepolation fo Single CCD Colo Camea Yi-Ming Wu, Chiou-Shann Fuh, and Jui-Pin Hsu Depatment of Compute Science and Infomation Engineeing, National Taian Univesit, Taipei, Taian Email: 88036@csie.ntu.edu.t;

More information

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true;

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true; This lectue Complexity o binay seach Answes to inomal execise Abstact data types Stacks ueues ADTs, Stacks, ueues 1 binayseach(int[] a, int value) { while (ight >= let) { { i (value < a[middle]) ight =

More information

Reformulating the map color theorem

Reformulating the map color theorem Discete Mathematics 302 (2005) 145 172 www.elsevie.com/locate/disc Refomulating the map colo theoem Louis H. Kauffman Depatment of Mathematics, Statistics and Compute Science, Univesity of Illinois at

More information

Structural Features for Recognizing Degraded Printed Gurmukhi Script

Structural Features for Recognizing Degraded Printed Gurmukhi Script Fifth International Conference on Information Technology: Ne Generations Structural Features for Recognizing Degraded Printed Gurmukhi Script M. K. Jindal Department of Computer Applications, P. U. Regional

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2 Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The

More information

Output Primitives. Ellipse Drawing

Output Primitives. Ellipse Drawing Output Pimitives Ellipse Dawing Ellipses. An ellipses is an elongated cicle and can be dawn with modified cicle dawing algoithm.. An ellipse has set of fied points (foci) that will have a constant total

More information

GCC-AVR Inline Assembler Cookbook Version 1.2

GCC-AVR Inline Assembler Cookbook Version 1.2 GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually

More information

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Computer Graphics and Animation 3-Viewing

Computer Graphics and Animation 3-Viewing Compute Gaphics and Animation 3-Viewing Pof. D. Chales A. Wüthich, Fakultät Medien, Medieninfomatik Bauhaus-Univesität Weima caw AT medien.uni-weima.de Ma 5 Chales A. Wüthich Viewing Hee: Viewing in 3D

More information

Derivation of the Nodal Forces Equivalent to Uniform Pressure for Quadratic Isoparametric Elements RAWB, Last Update: 30 September 2008

Derivation of the Nodal Forces Equivalent to Uniform Pressure for Quadratic Isoparametric Elements RAWB, Last Update: 30 September 2008 Deivation of the odal oces Equivalent to Unifom Pessue fo Quadatic sopaametic Elements RWB, Last Update: 0 Septembe 008 The displacement vecto u at an point within a single element, E, is lineal elated

More information

Efficient ACC using Binary Coding Stream for Color Descriptor

Efficient ACC using Binary Coding Stream for Color Descriptor Effient ACC usin Binay Codin Steam fo Colo Despto Anucha Tunkasthan Depatment of Compute Technoloy, Faculty of Sence and Technoloy, RMUTT, Thailand anucha_t@mutt.ac.th Astact Auto colo coelation (ACC)

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Complete Solution to Potential and E-Field of a sphere of radius R and a charge density ρ[r] = CC r 2 and r n

Complete Solution to Potential and E-Field of a sphere of radius R and a charge density ρ[r] = CC r 2 and r n Complete Solution to Potential and E-Field of a sphee of adius R and a chage density ρ[] = CC 2 and n Deive the electic field and electic potential both inside and outside of a sphee of adius R with a

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Computer Science 141 Computing Hardware

Computer Science 141 Computing Hardware Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431

More information

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR)

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR) SURFACE DATA HIERARCHICAL TRIANGULAR DECOMPOSITION Appoximate suface S y plana tiangula patches whose vetices ae a suset of data points defining S Fo each patch, compute an appoximation eo. maximum eo

More information

! Smaller, simpler, subcomponent of program! Provides abstraction. n hide low-level details, give high-level structure

! Smaller, simpler, subcomponent of program! Provides abstraction. n hide low-level details, give high-level structure Function Chpte 1 Functions Oiginl slides fom Gegoy Byd, Noth Colin Stte Univesity Modified slides by Chis Wilcox, Colodo Stte Univesity! Smlle, simple, subcomponent of pogm! Povides bstction n hide lo-level

More information

EQUATIONS can at times be tedious to understand

EQUATIONS can at times be tedious to understand DIGITAL IMAGE PROCESSING COURSE PROJECT, JUNE 2013 1 Augmented Reality Equation Plotte Salman Naqvi, Uzai Sikoa Digital Image Pocessing EE 368/ CS 232 Abstact Gaphical Visualization of an equation can

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Rubik's Shells.

Rubik's Shells. Ruik's Shells Ruik's Shells is a puzzle that consists of 4 intersecting rings, coloured heels ith 8 alls each, hich can rotat The heels are in to pairs; to axes ith a pair of heels on each, and the to

More information

ABS (ANTI LOCK BRAKE SYSTEM)

ABS (ANTI LOCK BRAKE SYSTEM) AS (ANTI OCK AKE SYSTEM) FOM POE SOUCE SYSTEM (SEE PAE 8) 60A AS 0 Y IE 0 EA 5 EA A5 A,A6 AS EAY A A 3 A 5 A 6 A Y 3 A IE D DATA INK CONNECTO (CHECK CONNECTO) I7 I6 I7:USADX ADE I6:EXCEPT USA DX ADE A

More information

Two Illuminant Estimation and User Correction Preference

Two Illuminant Estimation and User Correction Preference Two Illuminant Estimation and Use Coection Pefeence Donlian Chen 1, Abdelahman Kamel 1, Bian Pice 2 Scott Cohen 2 Michael S. Bown 1 1 National Univesity of Sinapoe 2 Adobe Reseach donlian.chen@u.nus.edu

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the

More information

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

Elastohydrodynamic Lubrication Analysis of Journal Bearings Using CAD

Elastohydrodynamic Lubrication Analysis of Journal Bearings Using CAD The 3d Intenational Confeence on Design Engineeing and Science, ICDES 1 Pilsen, Czech Repulic, August 31 Septeme 3, 1 Elastohydodynamic Luication Analysis of Jounal Beaings Using CAD Toshihio OZASA *1,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

This lecture. Abstract Data Types (ADTs) The Stack ADT ( 4.2) Stacks. Stack Interface in Java. Exceptions. Abstract data types Stacks Queues

This lecture. Abstract Data Types (ADTs) The Stack ADT ( 4.2) Stacks. Stack Interface in Java. Exceptions. Abstract data types Stacks Queues This lectue Abstact data types Stacks ueues Abstact Data Types (ADTs) An abstact data type (ADT) is an abstaction o a data stuctue An ADT speciies: Data stoed Opeations on the data Eo conditions associated

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

A Novel Parallel Deadlock Detection Algorithm and Architecture

A Novel Parallel Deadlock Detection Algorithm and Architecture A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2

More information

CS 450: COMPUTER GRAPHICS QUATERNIONS SPRING 2016 DR. MICHAEL J. REALE

CS 450: COMPUTER GRAPHICS QUATERNIONS SPRING 2016 DR. MICHAEL J. REALE CS 45: COMPUTER GRAPHICS QUATERNIONS SPRING 6 DR. MICHAEL J. REALE http://common.ikimedia.og/iki/fi le%3awilliam_roan_hamilton_pot ait_oal_combined.png INTRODUCTION Quatenion inented b Si William Roan

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Cold Drawn Tube. Problem:

Cold Drawn Tube. Problem: Cold Dawn Tube Poblem: An AISI 1 cold-dawn steel tube has an ID of 1.5 in and an OD of 1.75 in. What maximum extenal pessue can this tube take if the lagest pincipal nomal stess is not to exceed 8 pecent

More information

Shape Matching / Object Recognition

Shape Matching / Object Recognition Image Pocessing - Lesson 4 Poduction Line object classification Object Recognition Shape Repesentation Coelation Methods Nomalized Coelation Local Methods Featue Matching Coespondence Poblem Alignment

More information

C. S. Helvig Gabriel Robins Alexander Zelikovsky y. 1(a)). These locations correspond to a group of (up

C. S. Helvig Gabriel Robins Alexander Zelikovsky y. 1(a)). These locations correspond to a group of (up Impoved Appoximation Bounds fo the Goup Steine Polem C. S. Helvig Gaiel Roins Alexande Zelikovsky y Depatment of Compute Science, Univesity of Viginia, Chalottesville, Viginia 22903-2442 y Depatment of

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Coordinate Systems. Ioannis Rekleitis

Coordinate Systems. Ioannis Rekleitis Coodinate Systems Ioannis ekleitis Position epesentation Position epesentation is: P p p p x y z P CS-417 Intoduction to obotics and Intelligent Systems Oientation epesentations Descibes the otation of

More information

ANNOUNCEMENT. LECTURE 25 Spherical Refracting Surfaces

ANNOUNCEMENT. LECTURE 25 Spherical Refracting Surfaces ANNUNCEMENT Final: Thusday Dec 3, 208, 7 PM - 9 PM Location: Elliot Hall of Music Coves all eadings, lectues, homewok fom Chaptes 28 though 33 Multiple choice Pactice exams n the couse website and on CHIP

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

17/5/2009. Introduction

17/5/2009. Introduction 7/5/9 Steeo Imaging Intoduction Eample of Human Vision Peception of Depth fom Left and ight eye images Diffeence in elative position of object in left and ight eyes. Depth infomation in the views?? 7/5/9

More information

The papers in the series are intended for internal use and are distributed by the author.

The papers in the series are intended for internal use and are distributed by the author. Univesity of Helsinki Depatment of Compute Science Seies of Pulications C, No. C-1993-65 Impoved Methods fo Finding Association Rules Heikki Mannila, Hannu Toivonen, and A. Inkei Vekamo Helsinki, Deceme

More information

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs CSE Intoduction to Algoithms Depth Fist Seach and Stongly Connected Components W.L. Ruzzo, Summe 00 Undiected Depth-Fist Seach It s not just fo tees DFS() back edge tee edge if maked then etun; mak ; #

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Chapter 4 (Part III) The Processor: Datapath and Control (Pipeline Hazards)

Chapter 4 (Part III) The Processor: Datapath and Control (Pipeline Hazards) Chapte 4 (Pat III) The Pocesso: Datapath and Contol (Pipeline Hazads) 陳瑞奇 (J.C. Chen) 亞洲大學資訊工程學系 Adapted fom class notes by Pof. M.J. Iwin, PSU and Pof. D. Patteson, UCB 1 吃感冒藥副作用怎麼辦? http://big5.sznews.com/health/images/attachement/jpg/site3/20120319/001558d90b3310d0c1683e.jpg

More information

ASSIGN 01: Due Monday Feb 04 PART 1 Get a Sketchbook: 8.5 x 11 (Minimum size 5 x7 ) fo keeping a design jounal and a place to keep poject eseach & ideas. Make sue you have you Dopbox account and/o Flash

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information