Computer-Hardware Evaluation of Mathematical Functions

Size: px
Start display at page:

Download "Computer-Hardware Evaluation of Mathematical Functions"

Transcription

1 Computer-Hardware Evaluation of Mathematical Functions

2 This page intentionally left blank

3 Computer-Hardware Evaluation of Mathematical Functions Amos Omondi Zed Consultants, Canada ICP Imperial College Press

4 Published by Imperial College Press 57 Shelton Street Covent Garden London WC2H 9HE Distributed by Computer-Hardware Evaluation of Mathematical Functions Downloaded from World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore USA office: 27 Warren Street, Suite , Hackensack, NJ UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE Library of Congress Cataloging-in-Publication Data Omondi, Amos R., author. Computer-hardware evaluation of mathematical functions / Amos Omondi, Zed Consultants, Canada. pages cm Includes bibliographical references and index. ISBN (hardcover : alk. paper) 1. Computer arithmetic. 2. Computer arithmetic and logic units. 3. Computer algorithms. 4. Integrated circuits--verification. 5. Computer architecture. I. Title. QA76.9.C62O dc British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. Copyright 2016 by Imperial College Press All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher. For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher. Printed in Singapore

5 To Anne, Miles, and Micah

6 This page intentionally left blank

7 Preface Lo, the enraptured arithmetician. Easily satisfied, he asks for no Brussels lace, or a coach and six. To calculate contents his liveliest desires, and obedient numbers are within his reach. Elie de Joncourt, 1762 This book deals primarily with the methods used in the computerhardware evaluation of some elementary transcendental functions and some algebraic functions: trigonometric functions and their inverses, hyperbolic functions and their inverses, exponentials, logarithms, reciprocals, and square roots and their inverses. Nevertheless, a great deal of what is discussed is equally applicable to numerous other functions. Of necessity, some material on multiplication and division is also included. Titles of technical books are always quite straightforward and rarely require explanation. But, on the basis of some remarks from two people who looked at parts of the manuscript, I believe a few words on the hardware are in order; the few words are also a good starting point for a more detailed explanation on what this book is about and what background is required of the reader. The main point is this: contrary to what the title might suggest to some, this book does not contain numerous diagrams of logic circuits, gate-diagrams, diagrams that depict hardware blocks, etc., and discussions of such. On the other hand, leaving out the hardware could, perhaps, have led the reader to expect a much wider coverage than is the case. This book is not about hardware in the aforementioned sense, but it is also not about software algorithms, even though the algorithms given may be implemented in software. Perhaps the following remarks will be clarifying. vii

8 viii Computer-Hardware Evaluation of Mathematical Functions Computer-Hardware Evaluation of Mathematical Functions Downloaded from At the level of architecture, hardware for the evaluation of the functions listed above will consist of relatively simple functional units adders, multipliers, shifters, multiplexors, and so forth and the challenge is how best to put these together. At its highest level, that putting together is largely about the choice of methods, and the considerations are different from those in software implementation. Three examples will give some idea of the differences: The evaluation of a polynomial approximation for a given function: The basic hardware required for the evaluation of any polynomial is an adder, a multiplier, and some memory to hold the polynomialcoefficients; and these, perhaps with some replication, can be put together in fairly straightforward ways. The basic issue is then that of which (or what type of) polynomial, and the considerations for hardware implementation are different from those for software implementation. For example, in the former, the degree of the polynomial is very important, and even a single term going from degree n to degree n + 1 can make a substantial difference, especially in high-performance implementations. Sharing hardware: For hardware implementation, cost-effectiveness is critical; so it is helpful if the same hardware can be used for different functions. One therefore strives for methods that are very similar. On the other hand, the software-writer is unlikely to be particularly concerned with, say, whether one subroutine is used for both division and square-root evaluation, or whether there is one subroutine per function. Basic operations: Consider rational functions, which are quotients of polynomials. These can provide very good approximations for many functions and have been used routinely in software implementations, but their implementation requires division. In hardware, however, division is about as hard as the evaluation of the functions of interest and is therefore undesirable as a basic operation. This limits the range of algorithms that may usefully be considered for hardware evaluation. The emphasis of this book is therefore on those methods that are suitable for hardware evaluation, rather than on nitty-gritty hardware details that will mostly be straightforward for the well-prepared reader: the primary issues are how the methods have been derived, how they work, and how well they work. The reader who is familiar with the design of basic

9 Preface ix Computer-Hardware Evaluation of Mathematical Functions Downloaded from arithmetic units will be able to readily see how the methods can be implemented; we do not dwell on such matters but do make particular points as necessary. Therefore, a background in computer arithmetic, while helpful, is not strictly necessary. (On the other hand, the reader who requires details of implementations will readily find a good supply of descriptions in the published literature; however, many of the best are also particular to specific technologies.) A brief explanation of the origins of the book might perhaps help in giving the reader a better idea of what to expect as well as what background is expected: Some years ago, when I was with the School of Electrical and Electronic Engineering at Yonsei University (Seoul), I taught a course on computer arithmetic; this book is made up of the lecture notes updated and given some polish for the function evaluation half of that course. The readership I have in mind is largely similar to the students who took that course: postgraduate students in computer science, computer engineering, and electrical and electronic engineering. Nevertherless, none of the material is beyond an advanced undergraduate student. This book might also be useful, as an introduction to the subject matter, to professionals engaged in designing and building arithmetic units and to prospective researchers in the field. Indeed, the subject matter is so fascinating that even the merely-curious should find this book quite enjoyable. The aforementioned course was a complete one on computer arithmetic, and by the time function-evaluation came along, basic arithmetic-unit design had all been done. The ideal background for this book therefore consists of a reasonable understanding of digital logic, some knowledge of arithmetic-unit design, and a level of mathematics that one may reasonably expect of a well-equipped undergraduate student in science or engineering. The first two are not strict requirements. Some aspects of the basic arithmetic-unit algorithms are indeed essential and have been included in Chapter 2. Beyond that, what is covered in this book does not require much knowledge of arithmetic units, provided one is prepared to accept that adders, multipliers, dividers, and so forth can be realized in digital logic, as indeed is the case; it might even be that the reader already has in mind such building blocks and simply wishes to know how best to put them together for the evaluation of some function. There are a few places where statements are made on the comparative cost and performance of hardware; the reader who does not have the requisite background may simply take those on faith and proceed.

10 x Computer-Hardware Evaluation of Mathematical Functions Computer-Hardware Evaluation of Mathematical Functions Downloaded from The level of detail and choice of material (beyond the obvious) were largely determined by feedback from the original course, but I believe they are appropriate for similar readership elsewhere. On detail, there are places where, in response to students, I covered much more than I initially intended to; for example, what is Chapter 6 was originally just a few pages summarizing some basic results. And there are other places where faith seemed sufficient as the main ingredient. What all this means is that the atypical reader might consider the coverage somewhat uneven. I beg the forbearance of the reader who is unhappy with that, but the primary purpose and target-readership should be kept in mind. That applies as well to another possible source of minor irratations: the repetition, in a few places, of one or two short paragraphs. This is a left-over habit from the original lecture notes that shows up wherever it is necessary to draw the reader s attention to a significant explanation that has already been given, but I have considered that it would be helpful to not have him or her search back over a hundred pages or so to find the first instance. For the material, I did not cover only state-of-the-art methods. There are two main reasons for that. First, I considered that a (very) slightly historical view of how the state of the art came about would be helpful to the students not just in understanding the current current algorithms and their implementations but also in preparing them to understand and appreciate future advances. Second, it seemed to me unwise to make any assumptions about what one might be interested in putting to use and in what ways. For example, the assumption of existing building blocks (such as are to be found in FPGAs) will limit choices in what to implement, and it might well be that old methods are more suitable than the very best ; on the other hand, the situation is very different if the assumption is that everything can be done from scratch (as in custom ASIC). At the other extreme, from both the historical and the current (in practical terms), I have included a very small number of methods whose practicality is probably shaky and which best belong in the to-be-continued category. These methods embody novel ideas, and it is not unreasonable to expect that the situation will change with advances in technology and refinements. I considered it important that, say, students who might be interested in undertaking research in the field should be aware of such methods. Chapter 1 is on errors, range reduction, and rounding. Error-control is obviously important in any numerical computation, and the general concerns are how to keep errors low, how to determine error bounds for a given algorithm, and what the bounds are in particular cases. Range reduction

11 Preface xi Computer-Hardware Evaluation of Mathematical Functions Downloaded from the conversion of an evaluation on one argument range into one on a smaller range is necessary because most of the algorithms of interest work only for arguments in limited ranges, and others work better (e.g. converge faster) when the argument ranges are sufficiently constrained. And proper rounding is generally problematic for transcendental functions; in contrast with the case of basic arithmetic operations and algebraic functions in general, a great deal of effort and care are necessary in rounding for the transcendental functions. Redundant number-representation systems, in which a single number can have several representations, play a significant role in the design and implementations of algorithms for high-speed arithmetic. Chapter 2 consists of an introduction to such systems and their use in high-speed multiplication and division. Algorithms for division, whether or not they use such number systems, are very significant in relation to several algorithms that are discussed in this book: many of the latter algorithms have their origins in division algorithms and are very similar. In implementation, this means that essentially the same hardware can be used for all, and it should be noted that division will usually be implemented as a standard and required operation. The reader who has a good background in basic computer arithmetic may skip this chapter and return to particular sections according to references elsewhere. Chapter 3 covers the CORDIC algorithms, which are based on the idea of rotation in a geometric space. These algorithms are among the moststudied for the evaluation of elementary functions. Their chief merit is that they facilitate the use of essentially the same hardware for a large number of functions, and so implementations will have excellent cost:performance ratios if several functions are to be evaluated. Chapter 4 extends the material in Chapter 3, by including, for high-performance implementations, the use of redundant number representations and radices larger than two. Chapter 5 is on normalization, in which a function-evaluation consists of the computation of two sequences, such that as the values of one are driven to some constant, those of the other are driven to the value to be computed of the function at hand. The technique is a uniform approach to the direct evaluation of the functions covered in the CORDIC approach and of other functions that are evaluated only indirectly through CORDIC. Also included in the chapter are discussions on the use of redundant number representations and large radices for high performance. Chapter 6 covers polynomial evaluation in some generality. Although Taylor and Maclaurin series will be familiar to all students in science and

12 xii Computer-Hardware Evaluation of Mathematical Functions Computer-Hardware Evaluation of Mathematical Functions Downloaded from engineering, their practical limitations in numerical computation, especially for hardware evaluation, sometimes constitute a gap that must be filled; and familiarity with, say, Chebyshev polynomials and their applications might not be standard. For hardware evaluation, the polynomials are generally low-order ones, combined with some form of table lookup. Chapter 7 is on such table lookup and polynomial approximations. The last chapter is on the evaluation of reciprocals, square roots, and inverse square roots. These functions are especially important given the frequency with which they are used, and this is especially so for the square root, which is included in the IEEE standard on floating-point arithmetic. The first appearance of these functions is halfway through this book, but this chapter comes at the end because many of the methods described are based on those in the preceding chapters: normalization, polynomials and table lookup, and the use of redundant number representations. Comments, notification of errors, and so forth: I shall be grateful and indebted if any reader can spare the time to communicate these, to amos.omondi.ca@ieee.org Sir, In your otherwise beautiful poem ( The Vision of Sin ) there is a verse that reads Every moment a man dies, Every moment one is born. It must be manifest that if this were true, the population of the world would be at a standstill. In truth the rate of birth is slightly in excess of that of death. I would suggest that in the next edition of your poem you have it read Every moment a man dies, Every moment 1 1 is born. 16 Strictly speaking, this is not correct, the actual figure is so long that I cannot get it into a line, but I believe the figure 1 1 will be sufficiently accurate for poetry. 16 I am, Sir, yours, etc. Charles Babbage to Tennyson Letter, 1842

13 Acknowledgments All Thanks and Praise to The Almighty I was very fortunate in the staff at Imperial College Press that I worked with, and I am grateful for their high levels of professionalism. Alice Oven, commissioning editor, made sure that the initial phase went smoothly and quickly. Catharina Weijman, production editor, similarly made sure that the subsequent phases were as pain-free possible and also carried out thorough and helpful final checks. And Maia Vaswani is an author s dream of a copy editor: she was fast, completely thorough, and managed to catch several non-trivial technical errors. My friend Clare Davidson was kind enough to proof-read the first draft of the manuscript. I am indebted to her for that. xiii

14 This page intentionally left blank

15 Preface Acknowledgments Contents 1. Errors, Range Reduction, and Rounding Errors Computation errors Propagated errors Iterative algorithms Range reduction Rounding Redundant Representations and High-Speed Arithmetic Redundant number representations Carry save representation Redundant signed-digit representation High-speed multiplication Multiplier recoding Squaring High-speed division Multiplicative normalization Additive normalization SRT Very high radix vii xiii 3. CORDIC Trigonometric functions xv

16 xvi Computer-Hardware Evaluation of Mathematical Functions 3.2 Inverse trigonometric functions Hyperbolic functions and inverses Linear functions Errors and datapath precision Implementation Computer-Hardware Evaluation of Mathematical Functions Downloaded from 4. High-Performance CORDIC De Lugish CORDIC Correcting-Rotations CORDIC Branching CORDIC Differential CORDIC Double-Rotations CORDIC High-radix CORDIC Very-high-radix CORDIC Normalization Algorithms Normalization constants Reciprocals Exponential and logarithm functions Exponential Logarithm Trigonometric functions and inverses Square root and inverse High-performance exponential and logarithm Early termination and zero skipping Redundant representation and high radix Very-high-radix computation Polynomial and Rational-Function Approximations Quality of approximation Taylor series Chebyshev polynomials Legendre polynomials Interpolation Rational functions Table Lookup and Segmented Polynomial Approximations Polynomial-based table lookup

17 Contents xvii Computer-Hardware Evaluation of Mathematical Functions Downloaded from Bipartite tables Multipartite tables Addition Table lookup Addition Table-driven polynomial approximation Segmented polynomial approximation Uniform segmentation Segment boundaries and numbers Hierarchical segmentation LUT cascades Address remapping Errors Reciprocals, Square Roots, and Inverse Square Roots Polynomial approximations Reciprocals Newton Raphson method Goldschmidt normalization Square root and inverse Newton Raphson method and variations Goldschmidt normalization Multiplicative normalization: non-redundant digit set Multiplicative normalization: redundant digit set Additive normalization: redundant digit set SRT algorithms High-radix computation References 397 Index 411

Windows and Graphics Programming with Visual C ++

Windows and Graphics Programming with Visual C ++ Introduction to Windows and Graphics Programming with Visual C ++ with Companion Media Pack Second Edition This page intentionally left blank Introduction to Windows and Graphics Programming with Visual

More information

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser

More information

Differential geometry from a singularity theory viewpoint

Differential geometry from a singularity theory viewpoint Universidade de São Paulo Biblioteca Digital da Produção Intelectual - BDPI Departamento de Matemática - ICMC/SMA Livros e Capítulos de Livros - ICMC/SMA 2015-12 Differential geometry from a singularity

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Fundamentals of Operating Systems. Fifth Edition

Fundamentals of Operating Systems. Fifth Edition Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business

More information

COMPUTATIONAL DYNAMICS

COMPUTATIONAL DYNAMICS COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL

More information

Equations and Functions, Variables and Expressions

Equations and Functions, Variables and Expressions Equations and Functions, Variables and Expressions Equations and functions are ubiquitous components of mathematical language. Success in mathematics beyond basic arithmetic depends on having a solid working

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

FUZZY LOGIC WITH ENGINEERING APPLICATIONS FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY

More information

EC121 Mathematical Techniques A Revision Notes

EC121 Mathematical Techniques A Revision Notes EC Mathematical Techniques A Revision Notes EC Mathematical Techniques A Revision Notes Mathematical Techniques A begins with two weeks of intensive revision of basic arithmetic and algebra, to the level

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Language independent arithmetic Part 2: Elementary numerical functions

ISO/IEC INTERNATIONAL STANDARD. Information technology Language independent arithmetic Part 2: Elementary numerical functions INTERNATIONAL STANDARD ISO/IEC 10967-2 First edition 2001-08-15 Information technology Language independent arithmetic Part 2: Elementary numerical functions Technologies de l'information Arithmétique

More information

Implementation of CORDIC Algorithms in FPGA

Implementation of CORDIC Algorithms in FPGA Summer Project Report Implementation of CORDIC Algorithms in FPGA Sidharth Thomas Suyash Mahar under the guidance of Dr. Bishnu Prasad Das May 2017 Department of Electronics and Communication Engineering

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Modeling Indoor Air Pollution

Modeling Indoor Air Pollution Modeling Indoor Air Pollution This page intentionally left blank Modeling Indoor Air Pollution Darrell W Pepper University of Nevada, Las Vegas, USA David Carrington Los Alamos National Laboratory, USA

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

COMPUTER ORGANIZATION AND DESIGN. 5 th Edition. The Hardware/Software Interface. Chapter 3. Arithmetic for Computers Implementation

COMPUTER ORGANIZATION AND DESIGN. 5 th Edition. The Hardware/Software Interface. Chapter 3. Arithmetic for Computers Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface 5 th Edition Chapter 3 Arithmetic for Computers Implementation Today Review representations (252/352 recap) Floating point Addition: Ripple

More information

A Developer s Guide to the Semantic Web

A Developer s Guide to the Semantic Web A Developer s Guide to the Semantic Web von Liyang Yu 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 15969 5 schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

CS321 Introduction To Numerical Methods

CS321 Introduction To Numerical Methods CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types

More information

Guide to RISC Processors

Guide to RISC Processors Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Excel for Chemists. Second Edition

Excel for Chemists. Second Edition Excel for Chemists Second Edition This page intentionally left blank ExceL for Chemists A Comprehensive Guide Second Edition E. Joseph Billo Department of Chemistry Boston College Chestnut Hill, Massachusetts

More information

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,

More information

Albertson AP Calculus AB AP CALCULUS AB SUMMER PACKET DUE DATE: The beginning of class on the last class day of the first week of school.

Albertson AP Calculus AB AP CALCULUS AB SUMMER PACKET DUE DATE: The beginning of class on the last class day of the first week of school. Albertson AP Calculus AB Name AP CALCULUS AB SUMMER PACKET 2017 DUE DATE: The beginning of class on the last class day of the first week of school. This assignment is to be done at you leisure during the

More information

An Introduction to Programming with IDL

An Introduction to Programming with IDL An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN

More information

A Structured Programming Approach to Data

A Structured Programming Approach to Data A Structured Programming Approach to Data Macmillan Computer Science Series Consulting Editor: Professor F. H. Sumner, University of Manchester J. K. Buckle, The ICL 2900 Series Andrew J. T. Colin, Programming

More information

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Xin Fang and Miriam Leeser Dept of Electrical and Computer Eng Northeastern University Boston, Massachusetts 02115

More information

New Syllabus Mathematics for 0-Level 1

New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 2 New Syllabus Mathematics for 0-Levell Owen Perry, B.Sc., Head of Department of General

More information

Lecture 6: Arithmetic and Threshold Circuits

Lecture 6: Arithmetic and Threshold Circuits IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 6: Arithmetic and Threshold Circuits David Mix Barrington and Alexis Maciel July

More information

Fast Evaluation of the Square Root and Other Nonlinear Functions in FPGA

Fast Evaluation of the Square Root and Other Nonlinear Functions in FPGA Edith Cowan University Research Online ECU Publications Pre. 20 2008 Fast Evaluation of the Square Root and Other Nonlinear Functions in FPGA Stefan Lachowicz Edith Cowan University Hans-Joerg Pfleiderer

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Traveling Wave Analysis of Partial Differential Equations

Traveling Wave Analysis of Partial Differential Equations Traveling Wave Analysis of Partial Differential Equations Traveling Wave Analysis of Partial Differential Equations Numerical and Analytical Methods with MATLAB R and Maple Graham W. Griffiths City University,

More information

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 MATH-LITERACY MANUAL Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 1 Real Numbers 1.1 Sets 1 1.2 Constants and Variables; Real Numbers 7 1.3 Operations with Numbers

More information

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the

More information

CGF Lecture 2 Numbers

CGF Lecture 2 Numbers CGF Lecture 2 Numbers Numbers A number is an abstract entity used originally to describe quantity. i.e. 80 Students etc The most familiar numbers are the natural numbers {0, 1, 2,...} or {1, 2, 3,...},

More information

Helping Students Understand Pre-Algebra

Helping Students Understand Pre-Algebra Helping Students Understand Pre-Algebra By Barbara Sandall, Ed.D., & Mary Swarthout, Ph.D. COPYRIGHT 2005 Mark Twain Media, Inc. ISBN 10-digit: 1-58037-294-5 13-digit: 978-1-58037-294-7 Printing No. CD-404021

More information

Chapter 1. Math review. 1.1 Some sets

Chapter 1. Math review. 1.1 Some sets Chapter 1 Math review This book assumes that you understood precalculus when you took it. So you used to know how to do things like factoring polynomials, solving high school geometry problems, using trigonometric

More information

Ancient System of Operations: Computing with Mathematical Devices. By: Calvin L. Fitts Jr. History of Mathematics. Ms.

Ancient System of Operations: Computing with Mathematical Devices. By: Calvin L. Fitts Jr. History of Mathematics. Ms. Ancient System of Operations 1 Running head: ANCIENT SYSTEMS OF OPERATIONS Ancient System of Operations: Computing with Mathematical Devices By: Calvin L. Fitts Jr. History of Mathematics Ms. Jennifer

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

Algebra 2 Semester 2 Final Exam Study Outline Semester 2 Final Exam Study Tips and Information

Algebra 2 Semester 2 Final Exam Study Outline Semester 2 Final Exam Study Tips and Information Algebra 2 Semester 2 Final Exam Study Outline 2013 Semester 2 Final Exam Study Tips and Information The final exam is CUMULATIVE and will include all concepts taught from Chapter 1 through Chapter 13.

More information

MATHEMATICAL TOOLS IN COMPUTER GRAPHICS WITH C# IMPLEMENTATIONS

MATHEMATICAL TOOLS IN COMPUTER GRAPHICS WITH C# IMPLEMENTATIONS MATHEMATICAL TOOLS IN COMPUTER GRAPHICS WITH C# IMPLEMENTATIONS This page intentionally left blank World Scientific N E W J E R S E Y L O N D O N S I N G A P O R E B E I J I N G S H A N G H A I H O N G

More information

Formal verification of floating-point arithmetic at Intel

Formal verification of floating-point arithmetic at Intel 1 Formal verification of floating-point arithmetic at Intel John Harrison Intel Corporation 6 June 2012 2 Summary Some notable computer arithmetic failures 2 Summary Some notable computer arithmetic failures

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

Numerical Methods. with Computer. Programs C++ Pallab Ghosh

Numerical Methods. with Computer. Programs C++ Pallab Ghosh Numerical Methods with Computer Programs C++ in CD I N C Pallab Ghosh D LU ED Numerical Methods with Computer Programs in C++ PALLAB GHOSH Assistant Professor Department of Chemical Engineering Indian

More information

FPGA IMPLEMENTATION OF CORDIC ALGORITHM ARCHITECTURE

FPGA IMPLEMENTATION OF CORDIC ALGORITHM ARCHITECTURE FPGA IMPLEMENTATION OF CORDIC ALGORITHM ARCHITECTURE Ramanpreet Kaur 1, Parminder Singh Jassal 2 Department of Electronics And Communication Engineering, Punjabi University Yadavindra College of Engineering,

More information

A Parametric Error Analysis of Goldschmidt s Division Algorithm

A Parametric Error Analysis of Goldschmidt s Division Algorithm A Parametric Error Analysis of Goldschmidt s Division Algorithm - EXTENDED ABSTRACT - Guy Even Dept of Electrical Engineering Systems Tel-Aviv University Tel-Aviv 678 Israel guy@engtauacil Warren E Ferguson

More information

in this web service Cambridge University Press

in this web service Cambridge University Press 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition Part 1 Preliminaries 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition CHAPTER 1 Number systems and codes This

More information

A Structured Programming Approach to Data

A Structured Programming Approach to Data A Structured Programming Approach to Data Derek Coleman A Structured Programming Approach to Data Springer-Verlag New York Derek Coleman Department of Computation Institute of Science Technology University

More information

Second Edition. Concept Builders. Jana Kohout

Second Edition. Concept Builders. Jana Kohout Second Edition Concept Builders Jana Kohout First published in Australia as an online resource in 016. Edited and printed in 017. Jana Kohout 017 Reproduction and Communication for educational purposes

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 28 Chinese Postman Problem In this lecture we study the Chinese postman

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

PROBLEM SOLVING WITH FORTRAN 90

PROBLEM SOLVING WITH FORTRAN 90 David R. Brooks PROBLEM SOLVING WITH FORTRAN 90 FOR SCIENTISTS AND ENGINEERS Springer Contents Preface v 1.1 Overview for Instructors v 1.1.1 The Case for Fortran 90 vi 1.1.2 Structure of the Text vii

More information

Maths: Phase 5 (Y12-13) Outcomes

Maths: Phase 5 (Y12-13) Outcomes Maths: Phase 5 (Y12-13) Outcomes I know numbers are beautiful. If they aren t beautiful nothing is. Paul Erdose Maths is discovered it doesn t just exist. Maths is a tool to understand, question and criticise

More information

Guidelines for Writing Mathematical Proofs

Guidelines for Writing Mathematical Proofs Appendix A Guidelines for Writing Mathematical Proofs One of the most important forms of mathematical writing is writing mathematical proofs. The writing of mathematical proofs is an acquired skill and

More information

(Refer Slide Time 3:31)

(Refer Slide Time 3:31) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions

More information

Pre-Algebra Practice

Pre-Algebra Practice By Dr. Barbara Sandall, Ed.D., Dr. Melfried Olson, Ed.D., and Travis Olson, M.S. COPYRIGHT 2006 Mark Twain Media, Inc. ISBN 978-1-58037-755-3 Printing No. 404041-EB Mark Twain Media, Inc., Publishers Distributed

More information

Fast evaluation of nonlinear functions using FPGAs

Fast evaluation of nonlinear functions using FPGAs Adv. Radio Sci., 6, 233 237, 2008 Author(s) 2008. This work is distributed under the Creative Commons Attribution 3.0 License. Advances in Radio Science Fast evaluation of nonlinear functions using FPGAs

More information

Curriculum Map: Mathematics

Curriculum Map: Mathematics Curriculum Map: Mathematics Course: Honors Advanced Precalculus and Trigonometry Grade(s): 11-12 Unit 1: Functions and Their Graphs This chapter will develop a more complete, thorough understanding of

More information

Construction of digital integer arithmetic

Construction of digital integer arithmetic Construction of digital integer arithmetic FPGA implementation of high throughput pipelined division circuit Johan Arthur Øvergaard Master of Science in Electronics Submission date: June 2009 Supervisor:

More information

3.4 Equivalent Forms of Rational Numbers: Fractions, Decimals, Percents, and Scientific Notation

3.4 Equivalent Forms of Rational Numbers: Fractions, Decimals, Percents, and Scientific Notation 3.4 Equivalent Forms of Rational Numbers: Fractions, Decimals, Percents, and Scientific Notation We know that every rational number has an infinite number of equivalent fraction forms. For instance, 1/

More information

FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS

FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE INFORMATION THEORY Consulting Editor Robert G. Gallager FINITE FIELDS FOR COMPUTER

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 10967-3 First edition 2006-05-01 Information technology Language independent arithmetic Part 3: Complex integer and floating point arithmetic and complex elementary numerical

More information

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO

More information

Bits, Words, and Integers

Bits, Words, and Integers Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are

More information

Sample tasks from: Algebra Assessments Through the Common Core (Grades 6-12)

Sample tasks from: Algebra Assessments Through the Common Core (Grades 6-12) Sample tasks from: Algebra Assessments Through the Common Core (Grades 6-12) A resource from The Charles A Dana Center at The University of Texas at Austin 2011 About the Dana Center Assessments More than

More information

Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 02 Octal and Hexadecimal Number Systems Welcome

More information

GAP CLOSING. Grade 9. Facilitator s Guide

GAP CLOSING. Grade 9. Facilitator s Guide GAP CLOSING Grade 9 Facilitator s Guide Topic 3 Integers Diagnostic...5 Administer the diagnostic...5 Using diagnostic results to personalize interventions solutions... 5 Using Intervention Materials...8

More information

MASTERING COBOL PROGRAMMING

MASTERING COBOL PROGRAMMING MASTERING COBOL PROGRAMMING MACMILLAN MASTER SERIES Banking Basic English Law Basic Management Biology British Politics Business Communication Business Microcomputing Chemistry COBOL Programming Commerce

More information

Table of Contents. Introduction to the Math Practice Series...iv Common Mathematics Symbols and Terms...1

Table of Contents. Introduction to the Math Practice Series...iv Common Mathematics Symbols and Terms...1 Table of Contents Table of Contents Introduction to the Math Practice Series...iv Common Mathematics Symbols and Terms...1 Chapter 1: Real Numbers...5 Real Numbers...5 Checking Progress: Real Numbers...8

More information

8.B. The result of Regiomontanus on tetrahedra

8.B. The result of Regiomontanus on tetrahedra 8.B. The result of Regiomontanus on tetrahedra We have already mentioned that Plato s theory that the five regular polyhedra represent the fundamental elements of nature, and in supplement (3.D) to the

More information

MAT128A: Numerical Analysis Lecture One: Course Logistics and What is Numerical Analysis?

MAT128A: Numerical Analysis Lecture One: Course Logistics and What is Numerical Analysis? MAT128A: Numerical Analysis Lecture One: Course Logistics and What is Numerical Analysis? September 26, 2018 Lecture 1 September 26, 2018 1 / 19 Course Logistics My contact information: James Bremer Email:

More information

Implementation of Optimized CORDIC Designs

Implementation of Optimized CORDIC Designs IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 3 August 2014 ISSN(online) : 2349-6010 Implementation of Optimized CORDIC Designs Bibinu Jacob M Tech Student

More information

Network Performance Analysis

Network Performance Analysis Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and

More information

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes The Study of Computational Complexity Let s summarize what

More information

Integrated Algebra 2 and Trigonometry. Quarter 1

Integrated Algebra 2 and Trigonometry. Quarter 1 Quarter 1 I: Functions: Composition I.1 (A.42) Composition of linear functions f(g(x)). f(x) + g(x). I.2 (A.42) Composition of linear and quadratic functions II: Functions: Quadratic II.1 Parabola The

More information

Programming in Haskell

Programming in Haskell Programming in Haskell Haskell is one of the leading languages for teaching functional programming, enabling students to write simpler and cleaner code, and to learn how to structure and reason about programs.

More information

An FPGA Implementation of the Powering Function with Single Precision Floating-Point Arithmetic

An FPGA Implementation of the Powering Function with Single Precision Floating-Point Arithmetic An FPGA Implementation of the Powering Function with Single Precision Floating-Point Arithmetic Pedro Echeverría, Marisa López-Vallejo Department of Electronic Engineering, Universidad Politécnica de Madrid

More information

Alan J. Perlis - Epigrams on Programming

Alan J. Perlis - Epigrams on Programming Programming Languages (CS302 2007S) Alan J. Perlis - Epigrams on Programming Comments on: Perlis, Alan J. (1982). Epigrams on Programming. ACM SIGPLAN Notices 17(9), September 1982, pp. 7-13. 1. One man

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 7 January 30, 2012 CPSC 467b, Lecture 7 1/44 Public-key cryptography RSA Factoring Assumption Computing with Big Numbers Fast Exponentiation

More information

Workplace Communications The Basics George J. Searles Fifth Edition

Workplace Communications The Basics George J. Searles Fifth Edition Workplace Communications The Basics George J. Searles Fifth Edition Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the

More information

CHAPTER 18: CLIENT COMMUNICATION

CHAPTER 18: CLIENT COMMUNICATION CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your

More information

(Refer Slide Time 00:01:09)

(Refer Slide Time 00:01:09) Computer Organization Part I Prof. S. Raman Department of Computer Science & Engineering Indian Institute of Technology Lecture 3 Introduction to System: Hardware In the previous lecture I said that I

More information

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress

More information

(Refer Slide Time: 00:01:30)

(Refer Slide Time: 00:01:30) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture - 32 Design using Programmable Logic Devices (Refer Slide Time: 00:01:30)

More information

10.4 Linear interpolation method Newton s method

10.4 Linear interpolation method Newton s method 10.4 Linear interpolation method The next best thing one can do is the linear interpolation method, also known as the double false position method. This method works similarly to the bisection method by

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Slide Set 1. for ENEL 339 Fall 2014 Lecture Section 02. Steve Norman, PhD, PEng

Slide Set 1. for ENEL 339 Fall 2014 Lecture Section 02. Steve Norman, PhD, PEng Slide Set 1 for ENEL 339 Fall 2014 Lecture Section 02 Steve Norman, PhD, PEng Electrical & Computer Engineering Schulich School of Engineering University of Calgary Fall Term, 2014 ENEL 353 F14 Section

More information

Sine/Cosine using CORDIC Algorithm

Sine/Cosine using CORDIC Algorithm Sine/Cosine using CORDIC Algorithm Prof. Kris Gaj Gaurav Doshi, Hiren Shah Outlines Introduction Basic Idea CORDIC Principles Hardware Implementation FPGA & ASIC Results Conclusion Introduction CORDIC

More information

INVERSE PROBLEMS IN GROUNDWATER MODELING

INVERSE PROBLEMS IN GROUNDWATER MODELING INVERSE PROBLEMS IN GROUNDWATER MODELING Theory and Applications of Transport in Porous Media Series Editor: Jacob Bear, Technion - Israel Institute of Technology, Haifa, Israel Volume 6 The titles published

More information

Introduction to numerical algorithms

Introduction to numerical algorithms Introduction to numerical algorithms Given an algebraic equation or formula, we may want to approximate the value, and while in calculus, we deal with equations or formulas that are well defined at each

More information

CHAPTER 1: INTEGERS. Image from CHAPTER 1 CONTENTS

CHAPTER 1: INTEGERS. Image from  CHAPTER 1 CONTENTS CHAPTER 1: INTEGERS Image from www.misterteacher.com CHAPTER 1 CONTENTS 1.1 Introduction to Integers 1. Absolute Value 1. Addition of Integers 1.4 Subtraction of Integers 1.5 Multiplication and Division

More information

Functions and Graphs. The METRIC Project, Imperial College. Imperial College of Science Technology and Medicine, 1996.

Functions and Graphs. The METRIC Project, Imperial College. Imperial College of Science Technology and Medicine, 1996. Functions and Graphs The METRIC Project, Imperial College. Imperial College of Science Technology and Medicine, 1996. Launch Mathematica. Type

More information

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications Kui-Ting Chen Research Center of Information, Production and Systems, Waseda University, Fukuoka, Japan Email: nore@aoni.waseda.jp

More information

Skill 1: Multiplying Polynomials

Skill 1: Multiplying Polynomials CS103 Spring 2018 Mathematical Prerequisites Although CS103 is primarily a math class, this course does not require any higher math as a prerequisite. The most advanced level of mathematics you'll need

More information

Approximating Square Roots

Approximating Square Roots Math 560 Fall 04 Approximating Square Roots Dallas Foster University of Utah u0809485 December 04 The history of approximating square roots is one of the oldest examples of numerical approximations found.

More information

TECHNICAL TRANSLATION

TECHNICAL TRANSLATION TECHNICAL TRANSLATION Technical Translation Usability Strategies for Translating Technical Documentation JODY BYRNE University of Sheffield, UK A C.I.P. Catalogue record for this book is available from

More information

Computer Architecture

Computer Architecture Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta

More information

Topic C. Communicating the Precision of Measured Numbers

Topic C. Communicating the Precision of Measured Numbers Topic C. Communicating the Precision of Measured Numbers C. page 1 of 14 Topic C. Communicating the Precision of Measured Numbers This topic includes Section 1. Reporting measurements Section 2. Rounding

More information