Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs

Size: px
Start display at page:

Download "Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs"

Transcription

1 Design, Automtion nd Test in Europe, DATE 98, Pris, Frnce, Ferury 23-26, 998 Self-Adjusting Output Dt Compression: An Efficient BIST Technique for s V. N. Yrmolik Computer Systems Deprtment Belrussin Stte University of Informtics nd Rdioelectronics, Minsk, Belrus S. Hellernd, H.-J. Wunderlich Division of Computer Architecture University of Stuttgrt Germny Astrct After write opertions, BIST schemes for s relying on signture nlysis must compress the entire memory contents to updte the reference signture. This pper introduces new scheme for output dt compression which voids this overhed while retining the enefits of signture nlysis. The proposed technique is sed on new memory chrcteristic derived s the modulo-2 sum of ll ddresses pointing to non-zero cells. This chrcteristic cn e djusted concurrently with write opertions y simple EXOR-opertions on the initil chrcteristic nd on the ddresses ffected y the chnge. Introduction High density memories constitute n integrl prt of most present dy micro-electronic systems. To gurntee relile storge of dt, prticulrly in systems for sfety criticl pplictions, efficient test procedures re indispensle. Besides production testing, periodic mintennce testing is especilly importnt for memories to del with the prolem of dt retention, e. g. checking for dt losses fter power-off conditions or during run-time. Moreover, frequent opertions on the memory contents require on-line or periodic consistency checks. When memories re emedded in lrger integrted circuits, such s microprocessors or digitl communiction devices, conventionl techniques for externl memory testing cn no longer e pplied due to the limited ccessiility of the memories. To solve this prolem, nd lso to reduce the long testing times inherent to conventionl externl testing, numer of theoreticl nd prcticl uilt-in selftest (BIST solutions hve een proposed in the pst [-5, 7, -3, 6, 8]. This work ws supported y BMBF-Grnt WEI-X23.2. This pper ddresses the prolem of periodic consistency checking for emedded memories. The proposed strtegy is sed on the BIST rchitecture sketched in Figure. The test pttern genertor produces predetermined sequence of memory ddresses, nd the corresponding sequence of dt is fed into the output dt compressor, the finl stte of which represents chrcteristic of the memory contents. For the initil correct memory contents reference chrcteristic C is lerned this wy on chip nd sved in specific loction [4]. The sme procedure is repeted periodiclly, nd the respective chrcteristics re compred to C to revel inconsistencies. The test pttern genertor cn lso e used to generte the dt to e written into the memory for the production test. In this mode stndrd lgorithms my e pplied which re not considered within the frmework of this pper [6, 8]. Test Pttern Genertor Figure : ddresses Memory dt Block digrm of self-testing memory. Output Dt Compressor Since the descried technique checks the memory offline, there is certin ltency of error detection compred to conventionl on-line checking schemes [5]. But this is more thn outweighed y much smller re overhed nd simpler design. In [4] checking scheme sed on the rchitecture of Figure hs een proposed relying on signture nlysis for output dt compression. It hs een demonstrted y the uthors tht this kind of BIST rchitecture offers some very importnt dvntges, whereof the most vlule re: low re overhed, rther unffected ccess time during norml opertion, nd high fult coverge due to the low proility of lising errors [3, 9]. The min disdvntge, however, is the necessity to

2 2 djust the lerned signture fter write opertions. Updting the lerned signture requires to run through complete cycle of the test pttern genertor nd thus repeting the complete initil lerning phse. In this pper, we propose new scheme for output dt compression which voids this overhed while retining the dvntges of schemes relying on lerned signtures. It is sed on new chrcteriztion of the fult free memory contents nd cn esily e djusted during write opertions, which elimintes the repeted lerning phses of previous pproches nd significntly reduces the test time. It will e shown tht the scheme is prticulrly suitle for Ds, lthough it cn e efficiently implemented for vrious types of memory. The chievle test qulity is the sme s for schemes using conventionl signture nlysis: the proility of lising errors is 2 -k, where k denotes the length of the memory chrcteristic. The sic concepts of the proposed technique re introduced in Section 2 for it-oriented s well s for wordoriented s, complete BIST rchitecture is descried in Section 3. 2 A Self-Adjusting Chrcteristic for s In the following chrcteristic for fult free s is introduced which cn esily e djusted concurrently with write opertions. The updted chrcteristic is otined s comintionl function of the initil chrcteristic nd the ddresses ffected y the chnge. The sic principles of the proposed pproch will e explined in Section 2. for it-oriented s, the generliztion to wordoriented memories is descried in Section Bit-Oriented Memories As illustrted in Figure 2, the proposed reference chrcteristic C of the correct initil memory contents is defined s the modulo-2 sum of ll ddresses pointing to cells contining, nd it will therefore e clled modulo-2 ddress chrcteristic throughout the pper. ddress Figure 2: dt C = Modulo-2 ddress chrcteristic for it-oriented s. As shown in Figure 3, during BIST test pttern genertor (n LFSR with primitive feedck polynomil or counter, e.g. produces ll possile ddresses in n ritrry order. The output dt compressor determines the modulo-2 sum of ll ddresses corresponding to, nd if C = holds, the memory is considered s fult free. Figure 3: TPG test ptterns Output Dt Compressor C ddresses Comprtor pss/fil dt register Memory BIST sed on the modulo-2 ddress chrcteristic. The compressor circuit, which is shown in more detil in Figure 4, simply hs to perform itwise EXOR-opertions on ddresses controlled y the vlue stored in the dt register. Figure 4: ddress lines = = = FF FF FF dt & clock Output dt compressor sed on the modulo-2 ddress chrcteristic. In cse of write opertions, the reference chrcteristic must e djusted to the new chrcteristic C new, which is otined y modulo-2 ddition of ll ddresses with

3 3 chnges from to nd modulo-2 sutrction (which is equivlent to modulo-2 ddition of ll ddresses with chnges from to. More specificlly, ltering the contents of single cell corresponds to the modulo-2 ddition of the cell ddress to the initil chrcteristic C. In prticulr, this implies tht the compressor circuit of Figure 4 is lso cple of djusting the reference chrcteristic during write opertions in system mode ( detiled description of the complete implementtion with BIST will e given in Section 3. To summrize the sic concepts of the proposed pproch more formlly let the memory e represented y n rry M[,, m] with ddress spce A = {,, m}, nd let A := { " A M[] = } denote the set of ll memory ddresses pointing to entries. With " A representing the itwise modulo-2 sum of the inry representtion of ll ddresses in A,, the initil chrcteristic is otined s C = " A, nd the new reference chrcteristic fter write opertion t specific ddress * is given y new ( old new old C C * M * M *. = # [ ] [ ] Besides the simple mechnism of mpping chnges in memory to chnges in the chrcteristic, the proposed scheme hs numer of dditionl dvntgeous properties: All single errors re detectle nd dignosle, since if only single errors re ssumed, the expression C CTEST provides the ddress of the fulty memory cell. 2 All doule errors re detectle, since in this cse C CTEST corresponds to the sum of two ddresses r nd s, nd r $ s implies C C $. TEST 3 As shown elow, output dt compression sed on the modulo-2 ddress chrcteristic is equivlent to seril signture nlysis nd the proility of lising errors is thus estimted y 2 %k, where k denotes the length of the chrcteristic. Property 3 is n immedite consequence of the following oservtion. Oservtion: Let &(X " GF(2[X] e primitive polynomil of degree k, nd let & % k ( X : = X & ' ( X * denote the reciprocl polynomil. An LFSR with feedck polynomil & % (X nd initil stte (,,, genertes the sme stte trnsition sequence (in reverse component order s the LFSR with feedck polynomil &(X counting ckwrd from (,,,. The exmple shown in Figure 5 exploits this oservtion to verify property 3 for 7-it. A conventionl BIST is implemented using 3-it LFSR with primitive feedck polynomil &(X = + X + X 3 s test pttern genertor nd seril signture nlyzer with the reciprocl feedck polynomil & % (X = + X 2 + X 3. With n ll-zero initil stte the signture register does not chnge its contents efore the first cell contining is ddressed. The new contents is (,,, nd s the remining memory cells only contin entries, the signture nlyzer works like n utonomous LFSR with initil stte (,, for the rest of the test procedure. Since & % (X is the reciprocl of &(X, this implies tht the signture nlyzer siclly ehves like the test pttern genertor counting ckwrd from (,, (with reversed component order, thus the finl signture is (,, nd corresponds exctly to the ddress of the memory cell with entry. test ptterns TPG ddresses dt signture Figure 5: Correspondence etween signture nlysis nd modulo-2 ddress chrcteristic. If the contins more thn one non-zero entries, then similrly the signture is otined s modulo-2 sum of ll ddresses (in reversed component order corresponding to memory cells with contents. In generl the correspondence etween the modulo-2 ddress chrcteristic nd signture nlysis is descried y the following theorem which ws proven in [9, 7]. Theorem : Let M e it-oriented memory with m = 2 k - cells, &(X " GF(2[X] primitive polynomil of degree k, nd let A + GF(2 k \ {} contin the memory SA

4 4 ddresses pointing to entries. Furthermore, for = (,, k- " GF(2 k let r := ( k-,, denote the vector with components in reversed order. Then BIST using test pttern genertor with feedck polynomil &(X, seril signture nlyzer with feedck polynomil & % (X, initil sttes (,,, nd (,, for the test pttern genertor nd the signture nlyzer, respectively, nd test length of m is chrcterized y the fult free signture S = " A The theorem remins true, when the numer of memory cells is m < 2 k -, nd the initil stte of the test pttern genertor is selected, such tht the finl stte is (,,,. This implies tht for ny memory BIST sed on the modulo-2 ddress chrcteristic there exists n equivlent BIST configurtion sed on signture nlysis with primitive feedck polynomil, nd consequently the sme test qulity is gurnteed. In contrst to signture nlysis, however, the proposed scheme is cple of updting the reference chrcteristic fter write opertions in one step. This enormous gin in time (s mentioned efore, updting the reference signture in conventionl scheme requires to run through complete cycle of the test pttern genertor, is pid y only little hrdwre overhed. As explined ove, the proposed output dt compressor for n m-it memory cn e implemented using log 2 m EXOR-gtes nd one AND-gte. 2.2 Extension to word-oriented s r., - flip-flops,, log 2 m - The scheme for output dt compression introduced in the previous section cn esily e pplied to wordoriented s. As illustrted in Figure 6, for this purpose the word-oriented is considered s it-oriented memory with ddresses of the form ( w,, where w denotes the word ddress nd the it position within the word. Anlogous to Section 2. the memory cn then e modeled s two-dimensionl rry M[ m, n] with ddress spce A = {,, m} {,, n} nd -spce A := {( w, " A M[ w, ] = }. The reference chrcteristic C for the initil correct memory contents is determined s C, = ( ( w, " A where the modulo-2 sum of ddress pirs is defined y ( w, ( w, = ( w w,. w, word ddress Figure 6: it position Bit-oriented representtion of word-oriented. To clculte the corresponding chrcteristic during BIST n LFSR or counter genertes ll word ddresses in n ritrry order. For ech fixed word w* with ddress w* the modulo-2 sum of ll ddresses ( w*, pointing to entries is computed in one step, i. e. with A (w* denoting { M( w*, = } prtil chrcteristic Cw* w*, " A ( w* = ( is determined y comintionl circuit. This wy, cn e derived s CTEST Cw w,,.. m.. m " A ( w = = ( w w which is just the sum of ll it ddresses contining. To design n output dt compressor ccomplishing this tsk, it is crucil to derive n efficient implementtion for the prtil chrcteristic C w*. As introduced ove Cw* w*, w*,. " A ( w* " A ( w* " A ( w* * = ( = ' ( / It is esily verified tht w* = w*, " A ( w * if the numer of ones in w* is odd, nd " A ( w* w* yields the ll-zero vector, if the numer of ones in w* is even. Consequently, the first component of C w* cn e implemented s F # w* = " A ( w* w*, where F is function which determines the prity of the word w*. Since the it ddresses within the word w* re represented y inry l-it vectors, l log 2 n, =, -

5 " A ( w* is otined y itwise EXOR-opertions,, " A ( w* " A ( w* " A ( w* = ' l ( / K, * i with denoting the i-th component of,,. i. l. As i only it-ddresses with = cn contriute to the i-th sum " A ( w* it is sufficient to implement functions F i which count (modulo 2 the numer of ones t ll the ddresses with this property. The second component of C w* is then derived s = ( F F,, l " A ( w* i, K, Figure 7 shows n exmple for memory consisting of seven 4-it words. word ddress lines = = = = it positions dt register where A diff (w* := { M[ w*, ] old $ M[ w*, ] new }. As one cn esily verify, to ccomplish this tsk it is sufficient to feed the output dt compressor of Figure 7 with the difference-word M[ w* ] old M[ w* ] new. Concerning the hrdwre cost for the word-oriented cse, it cn e shown tht the EXOR-tree for implementing the functions F,, F l requires t most j ( 2 %. j. l EXOR-gtes. Overll, the output dt compressor of Figure 7 cn e implemented using, log 2 m- + l flipflops, log 2 m l. j. l j ( 2, % EXOR-gtes, nd AND-gte. Tle summrizes the hrdwre cost for some exmple configurtions of wordoriented s. # Words (m Wordlength (n # Flip- Flops # EXOR- Gtes # AND- Gtes F F F 2 = = = & = = FF FF FF FF FF clock Tle : Hrdwre overhed for the proposed output dt compressor. The length of chrcteristic is k : log m log n =, - +, - 2 2, nd the proility of lising errors for word-oriented % k 2 2 s is 2 2 %, log m = - %, log n-. Figure 7: Output dt compressor for word-oriented s. To djust the reference chrcteristic C in cse of write opertion t specific word-ddress w*, ll it positions hve to e determined with M[ w*, ] old $ M[ w*, ] new, nd the prtil chrcteristic C w* must e djusted to Cw new * = Cw old * ( w*,, " A ( w* diff 3 The BIST rchitecture In this section, complete BIST rchitecture sed on the proposed scheme for output dt compression is descried for Ds. The digrm in Figure 8 shows the necessry BIST equipment in shded locks. The BIST control unit distinguishes etween three min phses: During n initiliztion phse the reference chrcteristic C hs to e determined y running through complete cycle of the test pttern genertor TPG, which my e implemented s mximum period LFSR or counter. The output dt compressor is reset to the ll-zero vector t the eginning of this phse, nd

6 6 TPG Address Register M U X Decoder row ddress column ddress Memory Cells select c Refreshment Register run_bist init BIST Controller Switch Mtrix Test Register Dt Register I/O 2-input EXOR-Gtes c 2 MUX reset enle Output Dt Compressor enle enle C Comprtor pss/fil Figure 8: D with BIST. t the end of this phse the otined reference chrcteristic in the flip-flops of the output dt compressor is written to the register C. If pproprite test ptterns hve een written into the memory, C lso represents the outcome of strt-up test. 2 During system opertion C hs to e updted fter every write opertion. As explined is Section 2.2 this implies tht for ech write opertion the difference, i.e. the itwise EXOR of the old nd the new memory entry hs to e determined. Therefore, key issue in implementing the proposed BIST pproch is to ensure ckup of the old memory entry t low hrdwre nd performnce penlty. The est method to chieve this gol, of course, depends on the memory orgniztion. Here it is ssumed, tht refreshment lgorithm for the dynmic is used which writes the complete row contining the word trgeted y write request to the refreshment register efore loding the new word from dt register. In this cse the old memory entry cn e trnsferred from the refreshment register to the test register vi the switching mtrix. The updted reference chrcteristic now contined in the flip-flops of the output dt compressor is lso written to the register C. 3 During BIST, the test pttern genertor produces ll possile ddresses, nd the test chrcteristic is determined in the sme wy s the reference chrcteristic C during the initiliztion phse. However, during BIST the enle signl for register C is kept zero, such tht finlly oth chrcteristics C nd cn e compred to provide the test result t the output of the comprtor. The BIST controller hs to relize two loops, one for initiliztion nd one for BIST, nd hs to control the write opertion within two clock cycles. One counter of

7 7, - length log 2 m, two flip-flops, nd some comintionl logic re sufficient for implementing these three modes, one of which hs two sttes. In ddition to this, we need four n-it registers C,, TPG, nd Test Register, nd some comintionl logic. Prototype implementtions show n re requirement of the entire BIST equipment in the order of n-it registers nerly independent of the memory size. The BIST hrdwre is not plced within the dtpth nd the ddress logic, nd there is no time penlty for red ccesses. In strightforwrd implementtion of write ccesses there my e one dditionl clock ltency, s the old contents of the refreshment register must e written into the test register efore the new vlue of the dt register cn e cptured y the register. This ltency is voided, if the refreshment register on the one side nd the test nd dt registers on the other side work on different clock phses. They my even work on the sme phse, if the refreshment register hs two ports nd the switch mtrix is douled. 4 Conclusions In this pper we hve proposed new method for the uilt-in test of memory consistency. In contrst to methods known so fr, reference signture is not computed y scnning the entire memory periodiclly, ut y djusting it dynmiclly. The reference vlue of the fult free contents of the is computed s modulo-2 ddress chrcteristic, nd new technique for output dt compression hs een presented sed on this chrcteriztion. It hs een shown tht the sme test qulity is chieved s y conventionl pproch sed on signture nlysis. But compred to conventionl signture nlysis schemes n enormous gin in time is chieved t only slightly higher hrdwre costs. 5 References V. C. Alves, M. Nicolidis, P. Lestrt, nd B. Courtois: Built-in Self-Test for Multi-Port s; Proceedings IEEE Interntionl Conference on Computer-Aided Design, ICCAD-9, Novemer 99, pp S. Brgllo, F. Corno, P. Prinetto, M. Sonz Reord: Testing Switching Memory in Telecommuniction System; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 995, pp P. H. Brdell, W. H. McAnney, nd J. Svir: Built-In Test for VLSI: Pseudorndom Techniques; New York: John Wiley & Sons, H. Cheung, S. K. Gupt: A BIST Methodology for Comprehensive Testing of with Reduced Het Dissiption; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 996, pp B. Cockurn, Y.-F. N. St: Synthesized Trnsprent BIST for Detecting Scrmled Pttern-Sensitive Fults in s; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 995, pp R. Dvid, A. Fuentes, nd B. Courtois: Rndom Pttern Testing Versus Deterministic Testing of s; IEEE Trns. on Computers, Vol. C-38, No. 5, My 989, pp R. Dekker, F. Beenker, nd L. Thijssen: Relistic Built-In Self-Test for Sttic s; IEEE Design & Test of Computers, Vol. 6, No., Fe. 989, pp A. J. Vn de Goor: Testing Semiconductor Memories, Theory nd Prctice; Chichester: John Wiley & Sons, O. Keichi, M. Nicolidis, V. N. Yrmolik: Exct Alising Computtion for BIST; Proceedings IEEE Int. Test Conference, Wshington, DC, Oct. 995, pp K. Kinoshit, K. K. Sluj: Built-In Testing of Memory Using n On-Chip Compct Testing Scheme; IEEE Trnsctions on Computers, Vol. C-35, No., Octoer 986, pp K. T. Le, K. K. Sluj: A Novel Approch for Testing Memories Using Built-In Self-Testing Technique, Proceedings IEEE Interntionl Test Conference, Wshington, DC, 986, pp B. Ndeu-Dostie, A. Silurt, nd V. K. Agrwl: Seril Interfcing for Emedded-Memory Testing; IEEE Design & Test of Computers, Vol. 7, No. 2, April 99, pp M. Nicolidis: Trnsprent BIST for s; Proceedings IEEE Interntionl Test Conference, Bltimore, MD, Oct. 992, pp P. Olivo, M. Dlpsso: Self-Lerning Signture Anlysis for Non-Voltile Memory Testing; Proceedings IEEE Int. Test Conference, Wshington, DC, Oct. 996, pp T. R. N. Ro, E. Fujiwr: Error-Control Coding for Computer Systems; Englewood Cliffs, NJ: Prenctice Hll, Inc., N. Skshit et l.: A Built-in Self-Test Circuit with Timing Mrgin Test Function in Git Synchronous D; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 996, pp V. N. Yrmolik: Anlysis of Signture Testility of Digitl Circuits; Automtion nd Remote Control, Mrch 99, pp Y. You, J. P. Hyes: A self-testing dynmic chip; IEEE JSSC, Ferury 985, pp

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia PPS: User Mnul Krishnendu Chtterjee, Mrtin Chmelik, Rghv Gupt, nd Ayush Knodi IST Austri (Institute of Science nd Technology Austri), Klosterneuurg, Austri In this section we descrie the tool fetures,

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

TO REGULAR EXPRESSIONS

TO REGULAR EXPRESSIONS Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application. ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Address/Data Control. Port latch. Multiplexer

Address/Data Control. Port latch. Multiplexer 4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.

More information

Computer Arithmetic Logical, Integer Addition & Subtraction Chapter

Computer Arithmetic Logical, Integer Addition & Subtraction Chapter Computer Arithmetic Logicl, Integer Addition & Sutrction Chpter 3.-3.3 3.3 EEC7 FQ 25 MIPS Integer Representtion -it signed integers,, e.g., for numeric opertions 2 s s complement: one representtion for

More information

Concepts Introduced. A 1-Bit Logical Unit. 1-Bit Half Adder (cont.) 1-Bit Half Adder

Concepts Introduced. A 1-Bit Logical Unit. 1-Bit Half Adder (cont.) 1-Bit Half Adder oncepts Introduced A -Bit Logicl Unit sic rithmetic/logic unit clocks ltches nd ip-ops registers SRAMs nd RAMs nite stte mchines Below is -it logicl unit tht performs AN nd OR opertions Both the AN nd

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE 2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE Antoni Wolski nd Jri Veijlinen Technicl Reserch Centre of Finlnd Lortory for Informtion Processing Lehtisrentie

More information

Enginner To Engineer Note

Enginner To Engineer Note Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181

More information

Course Administration

Course Administration /4/7 Spring 7 EE 363: Computer Orgniztion Arithmetic for Computers Numer Representtion & ALU Avinsh Kodi Deprtment of Electricl Engineering & Computer Science Ohio University, Athens, Ohio 457 E-mil: kodi@ohio.edu

More information

Evolutionary Approaches To Minimizing Network Coding Resources

Evolutionary Approaches To Minimizing Network Coding Resources This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015 Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

A Reconfigurable Arithmetic Datapath Architecture

A Reconfigurable Arithmetic Datapath Architecture A Reconfigurle Arithmetic Dtpth Architecture Reiner W. Hrtenstein, Riner Kress, Helmut Reinig University of Kiserslutern Erwin-Schrödinger-Strße, D-67663 Kiserslutern, Germny Fx: 49 631 205 2640, emil:

More information

The dictionary model allows several consecutive symbols, called phrases

The dictionary model allows several consecutive symbols, called phrases A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

5 Regular 4-Sided Composition

5 Regular 4-Sided Composition Xilinx-Lv User Guide 5 Regulr 4-Sided Composition This tutoril shows how regulr circuits with 4-sided elements cn be described in Lv. The type of regulr circuits tht re discussed in this tutoril re those

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

A Comparison of High-Level Approaches for Speeding Up Pathfinding

A Comparison of High-Level Approaches for Speeding Up Pathfinding A Comprison of High-Level Approches for Speeding Up Pthfinding Nthn R. Sturtevnt Deprtment of Computing Science University of Alert Edmonton, Alert, Cnd nthnst@cs.ulert.c Roert Geiserger Fculty of Informtics

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Position Heaps: A Simple and Dynamic Text Indexing Data Structure

Position Heaps: A Simple and Dynamic Text Indexing Data Structure Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Product of polynomials. Introduction to Programming (in C++) Numerical algorithms. Product of polynomials. Product of polynomials

Product of polynomials. Introduction to Programming (in C++) Numerical algorithms. Product of polynomials. Product of polynomials Product of polynomils Introduction to Progrmming (in C++) Numericl lgorithms Jordi Cortdell, Ricrd Gvldà, Fernndo Orejs Dept. of Computer Science, UPC Given two polynomils on one vrile nd rel coefficients,

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Basics of Logic Design Arithmetic Logic Unit (ALU)

Basics of Logic Design Arithmetic Logic Unit (ALU) Bsics of Logic Design Arithmetic Logic Unit (ALU) CPS 4 Lecture 9 Tody s Lecture Homework #3 Assigned Due Mrch 3 Project Groups ssigned & posted to lckord. Project Specifiction is on We Due April 9 Building

More information

Lexical analysis, scanners. Construction of a scanner

Lexical analysis, scanners. Construction of a scanner Lexicl nlysis scnners (NB. Pges 4-5 re for those who need to refresh their knowledge of DFAs nd NFAs. These re not presented during the lectures) Construction of scnner Tools: stte utomt nd trnsition digrms.

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

Digital Design using HDLs EE 4755 Final Examination

Digital Design using HDLs EE 4755 Final Examination Nme Solution Digitl Design using HDLs EE 4755 Finl Exmintion Thursdy, 8 Decemer 6 :3-4:3 CST Alis The Hottest Plce in Hell Prolem Prolem Prolem 3 Prolem 4 Prolem 5 Prolem 6 Exm Totl (3 pts) ( pts) (5 pts)

More information

Compilers Spring 2013 PRACTICE Midterm Exam

Compilers Spring 2013 PRACTICE Midterm Exam Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision D McAfee Network Security Pltform (NS5x00 Quick Strt Guide) This quick strt guide explins how to quickly set up nd ctivte your McAfee Network Security Pltform NS5100 nd NS5200 Sensors in inline

More information

McAfee Network Security Platform

McAfee Network Security Platform NTBA Applince T-200 nd T-500 Quick Strt Guide Revision B McAfee Network Security Pltform 1 Instll the mounting rils Position the mounting rils correctly nd instll them t sme levels. At the front of the

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Bleach: A Distributed Stream Data Cleaning System

Bleach: A Distributed Stream Data Cleaning System Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom Biot, Frnce Emil: yongcho.tin@eurecom.fr Pietro Michirdi Eurecom Biot, Frnce Emil: pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch Zurich,

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org

More information

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information