Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Size: px
Start display at page:

Download "Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder"

Transcription

1 Computer Arithmetic Homework Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal to aturate the put at the all one repreentation. On the other hand, in the cae of a ubtraction of a poitive number from another, the abence of a carry indicate a negative reult. (See problem 1.6 in the book.) We ue thoe two fact in Fig. 1 to deign the aturating 8 bit adder/ubtractor where we et the aturation ignal to at = c 8 ub and we connect c 0 to ub to correctly fulfill the ubtraction. In a ingle full adder c = ab + bc in + ac in and the time i etimated to be two gate delay, one to produce the AND and the other for the OR. The wort cae delay i when a carry ripple through the eight full adder and then goe through the final XOR gate to aturate the reult. If we aume that the driving capability of the XOR gate i enough for the row of multiplexer then the total delay i: τ = (XOR) + 2 (mux) = 19 gate delay. A more accurate analyi may conider that b 0 pae through an XOR gate and hence the calculation of c 1 take longer than two gate delay. Each of the other full adder take only two gate delay ince their correponding b ignal would have already paed by the XOR gate before the arrival of the carry. Furthermore, the aumption that the aturation ignal i trong enough to drive eight multiplexer may not be true. That ignal hould be buffered. Hence the gate delay calculated above are a lower etimate. 2 Partitioned adder The main idea here i to enable or diable the propagation of the carry ignal between ucceive block deping on the width of the adder needed. Fig. 2 how a poible olution. I intentionally do not want to preent the other poibilitie and potential optimization in thi problem. You hould think ab them. Note that if the adder i partitioned then each ub-part i not getting the carry from the next lower part but it may have it own input carry. It i important to chooe the correct aturation ignal for each adder a well. Try to follow the diagram of the deign and undertand it function. 3 HDL implementation of a partitioned adder Thi homework attempt to help you tart uing Verilog to decribe and tet arithmetic circuit. It alo provide you with a few ource of information that might be ueful in your future reearch work. Firt, ome ueful link: (you can click on them directly if your pdf reader i et correctly) For Verilog: 1. A very good quick reference guide to Verilog: 2. Reource page: Verilator i a very fat and reliable imulator: 4. Cver (actually it free verion gplcver) i another good imulator: The proceeding of all the previou IEEE Sympoium on Computer Arithmetic (Arith): http: // 1

2 FA a b c um c FA a b c um c FA a b c um c FA a b c um c FA a b c um c FA a b c um c FA a b c um c FA a b c um c ub a[0] a[1] a[2] a[3] a[4] a[5] a[6] a[7] b[0] b[1] b[2] b[3] b[4] b[5] b[6] b[7] c0 c8 i0 i0 i0 i0 i0 i0 i0 i0 at [0] [1] [2] [3] [4] [5] [6] [7] Figure 1: An 8-bit ripple carry aturating adder/ubtractor. 2

3 c32 c Mux 4x1 c32 c16 c Mux 4x1 b[7:0] a[7:0] c8 a[7:0] b[7:0] c0 at_add8 i0 c8 at [7:0] ub [7:0] ci8 F a[7:0] b[7:0] c0 a8 a8 a16 F c32 c32 b[15:8] a[15:8] Mux 4x1 c16 a[7:0] b[7:0] c0 at_add8 i0 c8 at [7:0] ub [15:8] F b[23:16] a[23:16] a[7:0] b[7:0] c0 at_add8 i0 c8 at [7:0] ub [23:16] c Mux 4x Mux 4x1 a Mux 4x1 b[39:32] a[39:32] at_add8 at [7:0] ub [39:32] ci40 F 0 1 c40 i0 c8 c6 a8 b[47:40] a[47:40] c48 a[7:0] b[7:0] c0 at_add8 i0 c8 at [7:0] ub [47:40] ci48 a8 F c Mux 4x1 ub ci24 F b[55:48] a[55:48] a[7:0] b[7:0] c0 at_add8 at [7:0] ub [55:48] ci56 F a8 c56 i0 c8 a64 b[31:24] a[31:24] c32 a[7:0] b[7:0] c0 at_add8 i0 c8 at [7:0] ub [31:24] ci32 F b[63:56] a[63:56] a[7:0] b[7:0] c0 at_add8 c8 at [7:0] ub [63:56] a8 a16 a32 a32 a8 a16 a8 F F 0 1 c24 c16 a16 F c32 c32 c c48 c c48 c40 a64 Figure 2: A 64-bit partitioned adder/ubtractor. 3

4 The US patent and trademark office: Full paper of all the major conference on deign automation: VHDL Library of Arithmetic Unit: Fixed point arithmetic in VHDL: A dedicated language for decribing computer arithmetic algorithm: tohoku.ac.jp/arith/ For thoe intereted in cryptography and error correcting code, here i a page decribing a Galoi field arithmetic library: Next, we look at the iue of exhautive teting. The number of tet vector needed for one of the mode (ay the 1 64 mode) in the 64 bit partitioned adder i derived by conidering the poible tate of the two operand, each 64 bit, and the ubtraction ignal. Hence, the total number of input bit i = 129 and the number of tet vector for an exhautive tet i Given that we have four mode of operation and we aume that only one of them i active at any time, the total number of tet cae i thu = which i larger than tet vector. If each vector take 10 9 econd then we need ab econd which i more than day, i.e. it i practically impoible to tet uch a deign exhautively. The whole purpoe of thi calculation i to how that large deign cannot be teted exhautively with reaonable reource. Finally, we tart looking at the code. A full adder i a baic element in the deign of mot arithmetic circuit. Here i a ample code for thi baic element. 4 full adder 4 * A imple full adder circuit module fa (c,, in0, in1, in2); input in0, in1, in2; put c,; aign c = (in1 & in2) (in1 & in0) (in2 & in0); aign = (in1 ^ in2 ^ in0); module //fa Thi code i ued in chunk 13b and 14c. 4

5 In general, it i better to follow a pecific tyle while writing code in order to minimize mitake. In the above code, the lit of argument in the line giving the name of the module tart by the put followed by the input. If thi ame order i followed in all the code, the reader can eaily follow the relation between all the module when one module intantiate another. To form an eight bit adder we concatenate eight full adder together. One way to do thi i by intantiating the full adder on eight conecutive line uch a: fa add0(cin1, [0], in0[0], in1[0], cin0); fa add1(cin2, [1], in0[1], in1[1], cin1); fa add2(cin3, [2], in0[2], in1[2], cin2); fa add3(cin4, [3], in0[3], in1[3], cin3); fa add4(cin5, [4], in0[4], in1[4], cin4); fa add5(cin6, [5], in0[5], in1[5], cin5); fa add6(cin7, [6], in0[6], in1[6], cin6); fa add7(co, [7], in0[7], in1[7], cin7); The full adder in the leat ignificant poition receive the initial carry in. For the other full adder, the carry of the preceiding full adder i ued a a carry in. The full adder at the mot ignificant bit poition produce the final carry. A much fater (le typing) way i to ue the capabilitie of Verilog and ue an array of module in a ingle line a in fa adder[7:0] (.c(c),.(),.in0(in0),.in1(in1),.in2(cin)); which call eight full adder, pae the input, and receive the correponding put auming that the input and put are defined a array. The input and put are paed with an explicit ue of their name in order to avoid any confuion but thi i not neceary. For thi line to really imitate the eight line above we mut make the connection between the carrie of the module and the carrie into the following module: aign cin = {c[6:0],ci}; A further improvement would be to define a parameter 5 width parameter 5 define width 8 Thi code i ued in chunk 11 and 15. 5

6 and to ue it later in a line uch a fa adder[ width-1:0] (.c(c),.(),.in0(in0),.in1(in1),.in2(cin)); which help u to increae the width of the adder jut by changing the value of the parameter. Obviouly the input and put of uch a variable width adder hould be alo defined uing the ame width parameter. Hence the code of the adder become 6 variable width adder 6 * Variable width adder module adder (co,, in0, in1, ci); input [ width-1:0] in0, in1; input ci; put co; put [ width-1:0] ; verilator lint_off UNOPTFLAT wire [ width-1:0] cin; verilator lint_on UNOPTFLAT wire [ width-1:0] c; aign cin = {c[ width-2:0],ci}; fa adder[ width-1:0] (.c(c),.(),.in0(in0),.in1(in1),.in2(cin)); aign co = c[ width-1]; module //adder Thi code i ued in chunk 13b and 14c. 6

7 The comment before and after the line wire [ width-1:0] cin; are pecific to the verilator imulator ued in thi example. They are not needed in other imulator uch a cver (more ab that later). The adder i now ready and we hould build the tet bench for it. The tet bench 1. applie the input to the deign under tet, 2. read the put when they are ready, 3. compare thoe put to the correct put, 4. flag an error if the put do not match, 5. repeat the above tet cycle for all the input provided, and 6. produce a final report ab failure if any. 7a 7b If the input provided are all the poible combination of input for the deign under tet then the above teting procedure i an exhautive tet of the deign. Obviouly, exhautive tet are only feaible when the number of combination i limited enough for the tet to finih in a reaonable time. Digital deigner ue the term tet vector to deignate the input for a deign and the correponding correct put. A large number of uch tet vector i needed to produce a reaonable tet for mot deign. We may aume for now that another program exit to generate the required tet vector and ave the input into a file named input.txt while the correponding correct put are aved in a file named correct put.txt. The input of each tet vector are written in a pre-agreed order conecutively on one line of input.txt while the correponding correct put i written on the correponding line in put.txt. For example, in the cae of an 8 bit binary adder the following line in the input.txt file and the correponding line in the correct put.txt file could mean that we are adding the 8 bit value of 1 to the value of 2 with a carry in of 0 to produce a carry of 0 and a um of 3. For deign where the width of the operand i large, it might be eaier to read the line if they are written in hexadecimal notation intead of binary: and 0 03 If a large number of tet vector exit, the ue of hexadecimal notation reduce the ize of the file coniderably. The correctne of the tet vector generation proce i a big topic by itelf and we will aume that it ha been performed with fault. The tetbench can either read the correct put to compare them to the put of the deign under tet or it can ave the reult of the deign in a file put.txt to be compared later with the correct put. For our firt tet bench, we can thu define two parameter: Input/Output file name 7a define deign_timulu define deign_reult Thi code i ued in chunk 11. "input.txt" "put.txt" We hould alo define the number of tet vector that we will ue. number of tet vector 7b define num_tet // number of tet vector Thi code i ued in chunk 11. 7

8 8a The value i not cat in tone, it i jut the number of cae in one input file ued to tet a deign! We can think of the above teting cycle a running on their own clock cycle which we may call tetclock. In a combinational deign uch a an eight bit ripple adder there are no internal clock o the tetclock i the only clock in the ytem. In a equential deign the tetclock period will be a multiple of the period of the internal clock in order for the deign to produce it put ignal before checking them. A long a the tetclock period i long enough compared to the delay within the deign under tet, we may apply the input on one edge of the tetclock ignal (for example the poitive edge) and check the put on the other edge. If in an adder deign the two operand and carry in are called operanda, operandb, and Cin we can ue the following piece of code to read the input value: aign the input to one tet vector 8a * Apply the input on the poitive edge tetclock ) {operanda,operandb,cin}=tetvector[numvector]; 8b Thi code i ued in chunk 11. Here we aume that the tet vector exit in an array named tetvector and that we are currently applying vector number numvector. Thi array of tet vector may be read at the tart of the imulation from the input file. At thi initialization tage we hould tart our counter numvector at zero and we may alo initialize the put file to make it ready. initialize file 8b * Initialiazation: * Load tet vector, * open the put file, * zero the counter, initial // $readmemb( deign_timulu,tetvector); $readmemh( deign_timulu,tetvector); fd= $fopen( deign_reult, "w"); numvector =0; Thi code i ued in chunk 11. 8

9 9a The initialization code here aume that the input vector are in hexadecimal format. If they were in binary format then the $readmemb hould be ued. It i important to note that the ue of hexadecimal notation can caue ome minor trange effect. The command $readmemh produce the four bit value 0001 when it read a digit equal to 1 aigned to the carry in. In order to prevent warning or error from the imulator, the variable receiving thi value hould be 4 bit wide and then later the leat ignificant bit i ued while the 3 other bit are dropped. Hence, we define the deign input and put a deign ignal 9a * Signal needed for the deign reg [ width-1:0] reg [ width-1:0] reg [3:0] Cin; operanda; operandb; 9b wire [ width-1:0] wire Thi code i ued in chunk 11. um; carry; The deign under tet itelf i called uing only the leat ignificant bit of Cin: deign under tet 9b * Deign under tet take the input read from the input file * and produce the put that will be written to the put * file. adder DUT( carry, um, operanda,operandb,cin[0]); Thi code i ued in chunk 11. 9

10 At each negative edge of the tetclock ignal, the put of the deign i checked veru the correct put. If our counter numvector reache the final number of tet vector required the imulation. 10 check put and write to file until finihed 10 * Get the put and write it to a file on the negative edge tetclock ) // $fdiplay(fd, "%b_%b",carry,um); $fdiplay(fd, "%x_%x",carry,um); numvector =numvector+1; hould after the number of tet vector within the file if(numvector== num_tet ) $fcloe(fd); $finih; Thi code i ued in chunk

11 Again, the above code aume that the put file i in hexadecimal. For binary we hould ue %b intead of %x within the $fdiplay command. The teting procedure i jut a imple concatenation of the previou part together with ome definition of variable. 11 tet bench 11 width parameter 5 number of tet vector 7b Input/Output file name 7a * Tet bench procedure uing input and put file module tetbench(tetclock); input tetclock; * Variable to handle the put file * and count the number of tet vector. reg [31:0] fd; integer numvector; * The definition of tet clock a a wire * and the definition of the tetvector array. wire tetclock; reg [2* width+3:0] tetvector [ num_tet-1:0]; deign ignal 9a deign under tet 9b initialize file 8b aign the input to one tet vector 8a check put and write to file until finihed 10 module // tetbench Thi code i ued in chunk 13b and 14b. 11

12 Deping on the imulator ued, the variable to handle the put file may be defined a a wire or a an integer. The above tructure of the tet bench which read the input from a file and ave the put into a file i general enough to handle a large variety of deign not jut imple adder. The teting procedure above need the tetclock input ignal. We may imulate a clock generation by 12 clock generation 12 timecale 1p/1p define clk_cycle 4 // Clock period * Clock generation module clock(tetclock); // Interface put tetclock; // Internal clk ignal reg tetclock; initial tetclock=0; // Alway executing at time 0 and NEVER top // toggle the clock every half period alway #( clk_cycle/2) tetclock = ~tetclock; module // clock Thi code i ued in chunk 13b and 14a. 12

13 Since the code of the clock generation ue explicit delay it may produce error if ued in a ynthei tool. Thi code i ueful only for imulation not for ynthei. Thi ditinction between imulation code and ynthei code i alway good to remember. Uually the tet bench code contain ome command that cannot be yntheized uch a $readmemh, $fdiplay, and the ue of explicit delay. Another way to generate the clock i // Generate Clock with period = 66 delay initial forever tetclock = 1; #33; tetclock = 0; #33; It i alway good practice to tart any code with a preamble comment giving the date or verion of the file and who the author i a well a any copyright notice. 13a 13b generic preamble comment 13a * * Written by Hoam A. H. Fahmy in 2013 * for the tudent in hi computer arithmetic cla within * the Electronic and Communication Engineering Department * of Cairo Univerity, Egypt. * * For any other ue beyond the cla, pleae conult with the * original author. Thi code i ued in chunk The full tet bench file may contain all the circuit module in one file a in top module with all circuit in one file 13b generic preamble comment 13a clock generation 12 tet bench 11 full adder 4 variable width adder 6 * Top module connecting the clock and the tet bench module top(); wire tetclock; clock clock(tetclock); tetbench tet(tetclock); module // top Root chunk (not ued in thi document). 13

14 14a For large deign the incluion of all the module in one file i not very practical. In uch cae it i better to ue eparate file and ak the imulator to include the different file into the imulation. top module in a eparate file 14a generic preamble comment 13a clock generation 12 * Top module connecting the clock and the tet bench module top(); wire tetclock; clock clock (tetclock); tetbench tet(tetclock); 14b 14c module // top Root chunk (not ued in thi document). The other file in thi cae may include one for the tet bench tet bench file 14b generic preamble comment 13a tet bench 11 Root chunk (not ued in thi document). and one or more file for the deign deign file or file 14c generic preamble comment 13a full adder 4 variable width adder 6 Root chunk (not ued in thi document). 14

15 In the cae of a imple operation uch a the addition which could be eaily performed by very imple command in Verilog, we may ue Verilog operation intead of file containing tet vector. In thi cae we make a loop in Verilog to generate all the poible combination, aign the input value, check the put againt the reult of Verilog operation (aumed to be correct), and continue to exhaut all the poible cae. 15 tet bench with loop 15 generic preamble comment 13a width parameter 5 * Tet bench procedure uing a loop module tetbench(tetclock); input tetclock; * Variable x i a loop counter that tart at 0 * the mot ignificant bit of x give the carry in * while the ret of x give the two operand * the c and are the put of the deign * the vc and v are the correct put * the cin ignal i the carry in for the calculation * of the correct put reg [ width*2:0] x; wire c; wire [ width-1:0] ; reg [ width-1:0] v; reg [ width-1:0] cin; reg vc; initial x=0; cin =0; * At the poitive edge increment x * and check if it flipped back to zero tetclock) x = x+ 1; if (x==0) 15

16 $diplay("pae all tet"); $finih; // Intantiate yourcell, note how the input are given adder adder(c,, x[ width*2-1: width],x[ width-1:0],x[ width*2]); * Check at the negative edge of the clock * Note that the operator ued i!== not jut!= * the!= operator check only the 0 and 1 value * while the!== operator check alo the Z and X value tetclock) cin[0] = x[ width*2]; {vc,v} = {1 b0,x[ width*2-1: width]}+{1 b0,x[ width-1:0]}+{1 b0,cin}; // $diplay("%x_%x_%x",x[ width*2-1: width],x[ width-1:0],x[ width*2]); // $diplay("%x_%x",vc,v); if ({vc,v}!== {c,}) $diplay("error a=%d b=%d cin=%d",x[ width*2-1: width],x[ width-1:0],x[ width*2]); $diplay("error vc=%d v=%d c=%d =%d",vc,v,c,); $finih; module Root chunk (not ued in thi document). 16

17 For a imple deign with a mall number of input we can even do an exhautive tet manually by etting all the poible value and checking the put or viually by looking at waveform timing diagram of the deign ignal reulting from the imulation. An 8 bit adder depite being a imple deign i already beyond the poibility of manual checking in reaonable time. Another baic element that i ued in the deign of the aturating adder i the two to one multiplexer. 17a mux2x1 17a module mux2x1 (, i0,, ); input i0; input ; input ; put reg ; alway@(*) = ()? : i0; 17b module Root chunk (not ued in thi document). // mux2x1 We can combine the full adder and the multiplexer to form the cell of the aturating adder. The ret of the code hould be written here for a full olution. aturating adder cell 17b module atadd (); module Root chunk (not ued in thi document). // atadd 17

18 4 New carry ignal 1. When the value of g i and p i are ubtituted in the firt equation we get c i+1 = a i b i + (a i b i )c i (1) = a i b i + a i bi c i + ā i b i c i (2) = a i b i + a i c i + b i c i. (3) Similarly, when we ue the value of g i and p i in the econd equation we get c i+1 = b i (a i b i ) + (a i b i )c i (4) = b i (a i b i + ā i bi ) + a i bi c i + ā i b i c i (5) = a i b i + a i c i + b i c i. (6) The two expreion are equivalent and the fri claim i correct. 2. The ame approach a in traditional carry-lookahead i followed. c i+1 = g i p i + p i c i (7) c i+1 = g i p i + p i (g i 1 p i 1 + p i 1 c i 1 ) (8) c i+1 = g i p i + p i g i 1 p i 1 + p i p i 1 (g i 2 p i 2 + p i 2 c i 2 ) (9) c i+1 = g i p i + p i g i 1 p i 1 + p i p i 1 g i 2 p i 2 + p i p i 1 p i 2 (g i 3 p i 3 + p i 3 c i 3 ) (10) c i+1 = g i p i + p i g i 1 p i 1 + p i p i 1 g i 2 p i 2 + p i p i 1 p i 2 g i 3 p i 3 + p i p i 1 p i 2 p i 3 c i 3. (11) We define the group propagate ignal a then ue G i i 3 = g i p i + p i g i 1 p i 1 + p i p i 1 g i 2 p i 2 + p i p i 1 p i 2 g i 3 p i 3 (12) c i+1 = G i i 3 P i i 3 + P i i 3 c i. (13) Thi lat equation can be ued ince the term G P i i 3 i i 3 reduce to G i i 3 which make equation 13 equivalent to equation 11. A imilar grouping i ued at higher level. The block diagram hould be drawn here for a full olution. 3. The implification of the g generate ignal i an advantage of the new cheme but the complication of the carry equation at the higher level eem to overcome that advantage. In general, the traditional cheme i better ince it ue le logic gate which might make it fater, maller in area, and le in power conumption. However, if the baic element available for the implementation are multiplexer then the new deign might be fater. 18

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

VLSI Design 9. Datapath Design

VLSI Design 9. Datapath Design VLSI Deign 9. Datapath Deign 9. Datapath Deign Lat module: Adder circuit Simple adder Fat addition Thi module omparator Shifter Multi-input Adder Multiplier omparator detector: A = 1 detector: A = 11 111

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Lecture 8: More Pipelining

Lecture 8: More Pipelining Overview Lecture 8: More Pipelining David Black-Schaffer davidbb@tanford.edu EE8 Spring 00 Getting Started with Lab Jut get a ingle pixel calculating at one time Then look into filling your pipeline Multiplier

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)

More information

Performance Evaluation of search engines via user efforts measures

Performance Evaluation of search engines via user efforts measures IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning Parameter, UVM, Coverage & Emulation Take Two and Call Me in the Morning Michael Horn Mentor Graphic Corporation Colorado, USA Mike_Horn@mentor.com Bryan Ramirez Mentor Graphic Corporation Colorado, USA

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

11.1. Unit 11. Adders & Arithmetic Circuits

11.1. Unit 11. Adders & Arithmetic Circuits . Unit s & Arithmetic Circuits .2 Learning Outcomes I understand what gates are used to design half and full adders I can build larger arithmetic circuits from smaller building blocks ADDER.3 (+) Register.4

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Spring 2012 EE457 Instructor: Gandhi Puvvada

Spring 2012 EE457 Instructor: Gandhi Puvvada Spring 2012 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 2/17/2012, Friday in SLH200 Calculator and Cadence Verilog Guide are allowed; Time: 10:00AM-12:45PM Cloed-book/Cloed-note Exam Total point:

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR A. P. Mullery and R. F. Schauer Thoma J. Waton Reearch Center International Buine Machine Corporation Yorktown Height, New York R. Rice International Buine Machine

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Microsemantics as a Bootstrap in Teaching Formal Methods

Microsemantics as a Bootstrap in Teaching Formal Methods Microemantic a a Boottrap in Teaching Formal Method Raymond Boute INTEC Univeriteit Gent, Belgium Raymond.Boute@intec.UGent.be Abtract Introducing an elementary form of program emantic early in the curriculum

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Part 1 A New Number Format: The Unum

Part 1 A New Number Format: The Unum Part 1 yr op A New Number Format: The Unum ht ig 1 Overview l- ia er at M or yl Ta an Fr ci You can t boil the ocean. Former Intel executive, reacting to the idea of unum. Incidentally, the pronunciation

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Optimal Peer-to-Peer Technique for Massive Content Distribution

Optimal Peer-to-Peer Technique for Massive Content Distribution 1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information