Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Size: px
Start display at page:

Download "Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network"

Transcription

1 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy Eyingho, Smuel Flki nd Anthony Atyero 3 Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri eyimon@yhoo.com Deprtment of Computer Science, Federl University of Technology, Akure, Nigeri swoleflki@yhoo.com 3 Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri tyero@ieee.org ABSTRACT There is widely held notion in the literture tht there is n origin-destintion trffic mtrix for ll the hosts (end nodes) tht re ttched to ny switched locl re network. This is usully in reltion to the need to clculte the end-to-end (or mximum end-to-end) delys between ll the end nodes tht re ttched to the network, for the sole purpose of using these delys vlues to design upper-bounded dely switched locl re networks, in efforts t solving the dely problems of this clss of networks. In this pper, we show tht this notion of origin-destintion trffic mtrix for ll the hosts tht re ttched to switched locl re network does not seem to be correct. KEYWORDS End-To-End Dely, Origin-Destintion Pir, Switched Locl Are Networks. INTRODUCTION It is widely held notion in the literture tht to determine the verge network dely of switched Locl Are Network (switched LAN), the trffic mtrix of the hosts tht re ttched to the LAN hs to be formulted. For exmple, in [], it ws stted tht, let T ij denote the informtion flow in pckets per unit time between end nodes i nd j of the network; we define the trffic mtrix of the network to be the n n mtrix T= (T ij ) where n is the number of end nodes. Moreover, in [], the verge end-to-end dely time of switched locl re network ws defined with respect to the verge trffic between end node i nd end node j for ll end nodes tht re ttched to the LAN nd the verge dely between the end nodes ws defined s the weighted combintion of ll end-to-end dely times. Elbum nd Sidi on the other hnd in [3] defined minimum verge network dely s the verge dely between ll pirs of users in the network. In this pper, we show tht this notion of origin-destintion trffic mtrix for ll hosts tht re ttched to switched locl re network with view to using it to compute end-to-end delys (or verge end-to-end dely) does not seem to be correct. DOI : 0.5/ijdps

2 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0. ANALYSIS OF SWITCHED LOCAL AREA NETWORKS ORIGIN-DESTINATION TRAFFIC ENUMERATION METHOD USING THE HOSTS THAT ARE ATTACHED TO THE NETWORK For pcket switched [4 p.366], rndom ccess [5], lossless [4, p.366], [5] networks, offered lod = throughput, but, mount of dt trnsferre d throughput = therefore, time tken to effect the trnsfer mount of dt trnsferred offered lod = time tken to effect the trnsfer For ny origin-destintion pir of nodes (hosts), time tken to effect the trnsfer = dely from origin node (host) to destintion node (host) mximum time to effect the trnsfer = mximum dely from origin host to destintion host mximum time to effect the trnsfer from origin host to destintion host = mximum time (dely) through the st switch + mximum time (dely) through the nd switch + + mximum time (dely) through the n th switch on the origin-destintion pth If n externl site presents to the origin-destintion pth (route) Z pckets every second (loding or offered lod), then it presents pcket every Z seconds. Since for lossless system, offered lod = throughput, mximum time to effect the trnsfer of pcket = mximum dely from origin host to destintion host of pcket = mximum time (dely) through st switch + mximum time (dely) through nd switch + + mximum time (dely) through n th switch Z () where n = the number of switches in the origin-destintion pth (route). The inequlity symbol in () implies tht Z seconds is n upper bound on end-to-end dely for the origin-destintion pir of hosts. Above Z seconds, we will hve loss system. Therefore, since we re interested in the mximum (upper bounded) dely, the symbol in () cn be replced by n = symbol nd hence, () becomes n eqution. We cn lso rtionlize the preceding ide in this wy. Consider n origin-destintion pir of hosts tht re involved in communiction session. Let us ssume tht the locl re network (LAN) is switched Ethernet LAN. Assume tht X Megbits/sec (Mbps) = mximum Ethernet port trnsfer rte of host, X = pckets/sec. () (minimum Ethernet pcket length) = Z pckets/sec, sy. Or, it trnsfers pcket every Z seconds. 8

3 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 The minimum Ethernet pcket length should be used in () becuse, this will give us the mximum pckets/sec. (mximum loding) nd hence, it will give us n upper bounded dely sitution. Therefore, for lossless system, ech pcket should cross ll the switches in its pth from origin-to-destintion in Z seconds. This ide ws succinctly expressed by Berseks nd Gllgr in [4, p.5]; where it ws stted tht, strict implementtion of communiction session s rte of r pckets/sec. would be to dmit pcket every r seconds. As n exmple, for hosts (worksttions), X could be 0Mbps (meg bits per second) or the bsic Ethernet rte, 00Mbps (Fst Ethernet rte).for Servers, X could be,000mbps (Gigbit Ethernet rte). Consider network tht hs two () hosts connected by switch s shown in Figure. H H We cn see tht either of the hosts will be sending dt trffic to the other host or receiving dt trffic from it; therefore, we will hve the trffic mtrix shown in (3). (3) is Host sending dt trffic to Host nd Host receiving dt trffic from Host; similrly, is Host sending dt trffic to Host, nd Host receiving the trffic. is Host sending dt trffic to itself (which is not possible); nd is Host sending dt trffic to itself (which is lso not possible). Therefore, the digonl entries re not necessry, but we retin them so tht we cn get correct picture of the network trffic mtrix; the digonl entries re hence, crossed out. But we cn see from Figure nd from (3) tht end-to-end dely in the direction from Host to Host is the sme s the end-to-end dely from Host to Host; so for two () hosts network, we need end-to-end dely, since: end-to-end dely = end-to-end dely. Consider lso, network tht hs three (3) hosts. There re more thn one wys of connecting the hosts. It my be through switch or through multiple switches (this gin cn hve multiple configurtions).we illustrte just two of the configurtions in Figures nd 3. We should emphsize t this point tht, in our illustrtions (Figures.,, nd 3) nd indeed in ny LAN instlltion, one or more of the hosts my be server or servers (for exmple, file server, web server); but for the purpose of our nlysis, we regrd ll connected end devices (computing devices, printing devices nd others) s hosts. 9

4 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 H H H 3 H H 3 H Wht ever be the configurtion (connection) of the three hosts network does not mtter; wht is importnt in the context of our nlysis is tht, Host cn either be sending trffic to Host or receiving trffic from Host, it cn either be sending trffic to Host3 or receiving trffic from Host3. The sme scenrio holds for Host nd Host3. We therefore, hve the trffic mtrix for three (3) hosts connected through two () switches network s shown in (3) (4) Following our previous explntions, we cross out the digonl entries. Also, since the trffic from Host to Host will cross the sme number of switches from origin to destintion, s the trffic from Host to Host, it follows tht, end-to-end dely = end-to-end dely. Similrly, end-to-end dely 3 = end-to-end dely 3, end-to-end dely 3 = end-to-end dely 3.Therefore, for three (3) hosts network, we need 3 end-to-end delys. By following the preceding explntions, we cn proceed to write out the trffic mtrix for four (4) hosts network s shown in (5). By similr resoning, we cn see tht for four (4) hosts network, we need 6 end-to-end delys. Following the sme logic, we cn show tht for five (5) hosts network, we need 0 end-to-end delys, for six (6) hosts network, we need 5 end-to-end delys. 30

5 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 origin-destintion origin-destintion origin-destintion (5) We hve been ble to come-up with closed-form reltion for finding the number of end-to-end delys (number of origin-destintion pirs) to be used with inequlity () (in inequlity (), we hve considered only one () origin-destintion pir of two () hosts involved in communiction session) for ny switched LAN. For switched LAN, if, p = the LAN s number of end-to-end delys (with respect to ttched hosts or end nodes), k = number of end nodes (hosts) in the LAN, then, k x= origin-destintion 4 p = ( k x) (6) 3 (3 x= For exmple, if k =3, p = x ) = (3 x ) = (3 -) + (3 ) = + = 3 x = No mtter the number of hosts tht re ttched to the LAN, we cn clculte the number of end-to-end delys (number of origin host to destintion host delys) with respect to () by using (6). Consider the three (3) hosts, two () switches LAN shown in Figure 3. Since the ppliction of (6) gives us three origin-destintion pirs, nd from () the 3 origin-destintion pirs of hosts re -, -3, nd -3. For this network therefore, the three origin-destintion equtions (using () which hs n upper bound of Z ) re: origin-destintion 6 origin-destintion 5 For the - origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H (mximum end-to-end dely) = mx. time (dely) through switch = (7) Z For the -3 origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H 3 (mximum end-to-end dely) = mx. time (dely) through switch +mx. time (dely) through switch = (8) Z For the -3 origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H 3 (mximum end-to-end dely) = mx. time (dely) through switch +mx. time (dely) through switch = (9) Z3 where Z, Z, nd Z 3 re the Ethernet port trnsfer rtes in pckets per second of ny of the two hosts tht re involved in communiction session in (7), (8), nd (9) respectively. We cn write out (7), (8), nd (9) together in mtrix form s: 3

6 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 mx imum dely of origin/ destintion mximum end to ny dt pcket end dely 0 through switch origin/ destintion 3 mximum end to = end dely (0) origin/ destintion 3 mximum end to mx imum dely of ny dt pcket end dely through switch Where n entry in the bit mtrix is if pcket from or to ny of the hosts t either ends in the origin-destintion pth (the mximum end-to-end dely entry of the mximum end-to-end dely column vector) crosses the corresponding switch in trnsiting from origin host to destintion host; the entry is 0, if the pcket does not cross the switch. We cn re-write (0) s in (); where = = = 3 = 3 = nd = 0. Mtrix Eq. () cn be written for ny switched locl re network, with ny rbitrry number of m switches nd k hosts. Let y, y, y 3,,y p-, y p represent origin-destintion pir mximum end-to-end dely, origindestintion pir mximum end-to-end dely, origin-destintion pir3 mximum end-to-end dely,,origin destintion pir p- mximum end-to-end dely nd origin-destintion pir p mximum end-to-end dely respectively. mx imum dely of origin/ destintion mximum end to ny dt pcket end dely through switch origin/ destintion 3 mximum end to = end dely () origin/ destintion 3 mximum end to 3 3 mx imum dely of ny dt pcket end dely through switch Also, let x, x, x 3,, x m-, x m represent the mximum dely of ny dt pcket through switch, the mximum dely of ny dt pcket through switch, the mximum dely of ny dt pcket through switch 3,, the mximum dely of ny dt pcket through switch m-, the mximum dely of ny dt pcket through switch m respectively, then () cn be written for ny switched locl re network s in (). y x y y 3 3 = y p p yp p 3 p p m m 3m p m p m m m 3m p m pm x x 3 x m xm () 3

7 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 where y = Z, y = Z,,y p = nd x, x, x 3,., x m-, x m re the unknown. Z p m = number of switches in the locl re network; ij = /0, i =,,3,,p; j =,,3,,m re elements of the pth bit mtrix for the whole network.; ij =, if dt pcket tht trnsverses origin-destintion i psses through switch j; ij = 0, if dt pcket tht trnsverses origin-destintion i does not pss through switch j; p = the LAN s number of origin-destintion pirs of hosts, which is given by (6). Put in compct form, () cn be written s: y = AX (3) Where A is the p m mtrix, X = (x, x, x 3,,x m-, x m) is m column vector, nd y = (y, y, y 3,,y p-, y p) is p column vector in () respectively. On the surfce, () seems to support the notion tht there is n origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched LAN s enuncited (we think, not correctly) in [], [], [6]. We now explin why this notion does not seem to be correct when pplied to switched LANs. If we look t (0), we see tht rows nd 3 of the bit mtrix hve the sme type of entries, indeed = 3 nd = 3 in reltion to (). This will mke the set of vectors resulting from () to be linerly dependent. If () is written out for (), we will hve (4). Crrying out mtrix multipliction on (4) will result in the system of equtions s shown in (5). y y y 3 = 3 3 x x (4) y = x + x y = x + x y 3 = 3 x + 3 x (5) (5b) (5c) The reson for the liner dependence of the system of equtions in (5) is tht, if we look t the network of Figure 3, for host H to communicte with host H 3, nd vice vers, dt pckets will trnsit through switch nd switch ; the sme thing s when host H is to communicte with host H 3 or H 3 with H. Therefore, the mximum delys of dt pcket in switch nd switch for the two communiction sessions re the sme; hence, the similrity of the entries in rows nd 3 of the end-to-end pths bit mtrix in (0). In the words of Kreyzig in [7, p.33], wht is the point of liner independence nd dependence? And he provided the following nswer: well, from linerly dependent set of vectors, we my often omit vectors tht re liner combintion of others until we re finlly left with linerly independent subset of the relly essentil vectors, which cn no longer be expressed linerly in terms of ech other [7, p.33]. Therefore, if we eliminte the linerly dependent set of vectors from (4), some of the y i s will vnish; mening tht the communiction pths of some of the hosts (origin-destintion pirs of hosts) will vnish. This is becuse pckets trvelling between two end hosts will suffer mximum delys in the sme set of switches long their end-to-end pths. This proves the fct (nd we re proposing new theory) tht there is no origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched locl re network. 33

8 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 3. CONCLUSIONS We hve shown in the context of computing the end-to-end (or mximum end-to-end) delys of switched locl re networks tht there is no origin-destintion pir trffic mtrix for ll the hosts tht re ttched to ny of such networks. We hve therefore, proposed the theory tht, there is no origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched locl re network. How then do we enumerte ll the end-to-end delys of ny switched locl re network, in order to be ble to clculte, for exmple, the network verge of mximum end-to-end delys? This cn be used to design n upper bounded dely switched locl re network. A methodology for enumerting ll the endto-end delys of ny switched locl re network will be reported in nother pper. REFERENCES [] P. Torb & E. Kmen (999) Lod Anlysis of Pcket Switched Networks in Control Systems, Proceedings 5 th Annul Conference of the IEEE Industril Electronics Society, Sn Jose, CA, vol. 3, pp. 7. [] E., Knem, P. Torb, K. Cooper & G. Custodi (999) Design nd Anlysis of Pcket Switched Networks for Control Systems, Proceedings IEEE Conference on Decision nd Control, Phoenix, AZ, pp [3] R. Elbum & M. Sidi (996) Topologicl Design of Locl Are Networks using Genetic Algorithms, IEEE Trnsctions on Networking, vol.4, no.5, pp [4] D. Bertseks & R. Gllger (99) Dt Networks, Prentice-Hll, Englewood Cliffs, USA. [5] M. Reiser (98) Performnce Evlution of Dt Communictions Systems, Proceedings of the 98 IEEE Conference, vol. 70, no., pp [6] N. Krommencker, E. Rondeu, & T. Divoux (00) Study of Algorithms to Define the Cbling Pln of Switched Ethernet for Rel-Time Applictions, Proceedings of the 8 th IEEE Interntionl Conference on Emerging Technologies nd Fctory Communictions, Antibes, pp.3-30 [7] E. Kreyzig (003) Advnced Engineering Mthemtics, 8 th Edition, John Wiley nd Sons, New York, USA. Mondy Ofori Eyingho obtined B. Sc. Degree in Electronic nd Electricl Engineering from the Obfemi Awolowo University, Ile-Ife, Nigeri in 988. He lso holds Post-Grdute Diplom in Computer Science from the University of Lgos, Lgos, Nigeri (99), n MBA (Generl Mngement) Degree from the River Stte University of Science nd Technology, Port-Hrcourt, Nigeri (003), n M.Sc Degree in Computer Engineering, from the Federl University of Technology, Owerri, Nigeri (004), nd Ph. D in Computer Engineering from Covennt University, Ot, Nigeri (0). Dr. Eyingho hs hd extensive industril work experience in number of corporte orgniztions. He is currently Lecturer in the Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri. Dr. Eyingho hs published scholrly ppers in interntionl journls. He is member of The Nigerin Society of Engineers, COREN Registered Electronics Engineer, nd member Nigeri Computer Society. His principl reserches re in the res of developing nd implementing microprocessor-bsed systems nd performnce optimiztion of locl re networks. 34

9 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Oluwole Smuel Flki is Professor of Computer Engineering t the Federl University of Technology, Akure, Nigeri. He holds n M. Eng Degree in Electricl Engineering from Leningrd University, n M. Sc Degree in Computer Science from UCLA nd Ph.D in Electricl Engineering from the University of Lgos, Lgos, Nigeri. His reserch interests re in the res of Computer Architecture, Computer Communictions nd Networking, Network Security nd Digitl Signl Processing. He is Fellow of the Nigeri Computer Society, Member of the Nigerin Society of Engineers, Member of IEEE nd Member of ACM. Aderemi A. Atyero is Senior Lecturer in the Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri. He grduted from the Moscow Institute of Technology (MIT) with Bchelor of Science Degree in Rdio Engineering nd Mster of Science Degree in Stellite Communiction Systems in 99 nd 994 respectively. He received Ph.D from the Moscow Stte Technicl University of Civil Avition (MSTUCA) in 000. Dr. Atyero is member of the Institute of Electricl nd Electronic Engineers. He hs published number of scientific ppers in Interntionl peer-reviewed journls nd proceedings. He hs served s the Hed of Deprtment of Electricl nd Informtion Engineering t Covennt University. He is on the editoril bord of the Covennt Journl of Science nd Technology. He is recipient of the 009 Ford Foundtion Teching Innovtion Awrd. His current reserch interests re in Informtion Theory nd Stochstic Self-Similr Processes nd their pplictions in telecommunictions.. 35

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

A Fixed Point Approach of Quadratic Functional Equations

A Fixed Point Approach of Quadratic Functional Equations Int. Journl of Mth. Anlysis, Vol. 7, 03, no. 30, 47-477 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.988/ijm.03.86 A Fixed Point Approch of Qudrtic Functionl Equtions Mudh Almhlebi Deprtment of Mthemtics,

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

AVolumePreservingMapfromCubetoOctahedron

AVolumePreservingMapfromCubetoOctahedron Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES OSP WEIGH SEIG OPIMIZAIO OR SIGLE LIK AILURES Mohmmed H. Sqlli, Sdiq M. Sit, nd Syed Asdullh Computer Engineering Deprtment King hd University of Petroleum & Minerls Dhhrn 31261, Sudi Arbi {sqlli,sdiq,ssd}@kfupm.edu.s

More information

Solutions to Math 41 Final Exam December 12, 2011

Solutions to Math 41 Final Exam December 12, 2011 Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012 Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Available at ISSN: Vol. 4, Issue 2 (December 2009) pp (Previously Vol. 4, No.

Available at   ISSN: Vol. 4, Issue 2 (December 2009) pp (Previously Vol. 4, No. Avilble t http://pvmu.edu.edu/pges/398.sp ISSN: 93-9466 Vol. 4, Issue December 009 pp. 434 444 Previously Vol. 4, No. Applictions nd Applied Mthemtics: An Interntionl Journl AAM On -ry Subdivision for

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Introduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example

Introduction to Computer Engineering EECS 203  dickrp/eecs203/ CMOS transmission gate (TG) TG example Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Chapter Spline Method of Interpolation More Examples Electrical Engineering

Chapter Spline Method of Interpolation More Examples Electrical Engineering Chpter. Spline Method of Interpoltion More Exmples Electricl Engineering Exmple Thermistors re used to mesure the temperture of bodies. Thermistors re bsed on mterils chnge in resistnce with temperture.

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

About the Finite Element Analysis for Beam-Hinged Frame. Duan Jin1,a, Li Yun-gui1

About the Finite Element Analysis for Beam-Hinged Frame. Duan Jin1,a, Li Yun-gui1 Advnces in Engineering Reserch (AER), volume 143 6th Interntionl Conference on Energy nd Environmentl Protection (ICEEP 2017) About the Finite Element Anlysis for Bem-Hinged Frme Dun Jin1,, Li Yun-gui1

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

4-1 NAME DATE PERIOD. Study Guide. Parallel Lines and Planes P Q, O Q. Sample answers: A J, A F, and D E

4-1 NAME DATE PERIOD. Study Guide. Parallel Lines and Planes P Q, O Q. Sample answers: A J, A F, and D E 4-1 NAME DATE PERIOD Pges 142 147 Prllel Lines nd Plnes When plnes do not intersect, they re sid to e prllel. Also, when lines in the sme plne do not intersect, they re prllel. But when lines re not in

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

x )Scales are the reciprocal of each other. e

x )Scales are the reciprocal of each other. e 9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho IMAGE QUALITY OPTIMIZATIO BASED O WAVELET FILTER DESIG AD WAVELET DECOMPOSITIO I JPEG2000 Do Qun nd Yo-Sung Ho School of Informtion & Mechtronics Gwngju Institute of Science nd Technology (GIST) 26 Cheomdn-gwgiro

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,

More information

Integration. October 25, 2016

Integration. October 25, 2016 Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Ray surface intersections

Ray surface intersections Ry surfce intersections Some primitives Finite primitives: polygons spheres, cylinders, cones prts of generl qudrics Infinite primitives: plnes infinite cylinders nd cones generl qudrics A finite primitive

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

International Journal of Mechanical Engineering and Applications

International Journal of Mechanical Engineering and Applications Interntionl Journl of Mechnicl Engineering nd Applictions 203; (2) : 28-33 Published online My 30, 203 (http://www.sciencepublishinggroup.com/j/ijme) doi: 0.648/j.ijme.203002. Evlution of intensity of

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-232 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round

More information

SIMPLIFYING ALGEBRA PASSPORT.

SIMPLIFYING ALGEBRA PASSPORT. SIMPLIFYING ALGEBRA PASSPORT www.mthletics.com.u This booklet is ll bout turning complex problems into something simple. You will be ble to do something like this! ( 9- # + 4 ' ) ' ( 9- + 7-) ' ' Give

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Enginner To Engineer Note

Enginner To Engineer Note Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181

More information

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve. Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the

More information