Towards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic
|
|
- Kelly O’Brien’
- 5 years ago
- Views:
Transcription
1 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Towards a Fast and Reliale Software Implementation of SLI-FLP Hyrid Computer Arithmetic UNANG SHEN AND PETER R. TURNER Department of Mathematics and Computer Science Clarkson University Potsdam, N 3699 U.S.A. pturner@clarkson.edu Astract: - In this paper we descrie a C++ implementation of a hyrid system comining SLI (symmetric level-index) arithmetic and FLP (floating-point) arithmetic. The principal motivation for the work to e presented is to promote the use of SLI arithmetic as a practical framework for scientific computing. This hyrid arithmetic is essentially overflow and underflow free, and its implementation has shown the suitaility to e used in real life computations. Key-Words: - symmetric level-index, computer arithmetic, overflow, underflow, hyrid, numer representation. Introduction This paper is concerned with the implementation, which could e used in practical computations, of an over/underflow free arithmetic ased on symmetric level-index (SLI) system. The implementation currently can e run in a C++ environment of either WINDOWS or LINU, and is availale for download at There are other software implementations of SLI arithmetic, typically in MATLAB, FORTRAN [6], or PASCAL [9]. The purposes of these implementations are to verify the algorithms, and to show the effectiveness of a potential hardware implementation y some numerical experiments. Besides those motivations, the new C++ implementation emphasizes more its practical use as software, with some recent improvements of the algorithms and the design of a hyrid numer representation scheme. The choice of programming language is ased on the fact that C++ is efficient, flexile, versatile, and popular in scientific computation. We claim the implementation is appropriate for use in some real life computational prolems, where over/underflow causes troule. A systematic testing process was executed to show its reliaility and efficiency in section 4. An application is also descried in [8] with some performance records of the program. Ease of use is also an important concern for the implementation. Little knowledge aout SLI arithmetic is required, and no additional analysis to the computational prolem is needed to use the C++ lirary. In other words, it is not necessary to predict which variale has the risk of overflow or underflow in floating-point (FLP) arithmetic, or to estimate how large or how small the result could e, if the FLP representale range is to e exceeded. When the desired operations in a program are supported y this C++ implementation, all a programmer needs to do is to simply replace the data type doule with type SLI for all real numer variales. The maority of this paper will discuss the design of the hyrid numer representation scheme, and the algorithms to perform arithmetic operations, as well as a few implementational details of them in C++. A little overview of SLI arithmetic is provided meanwhile. 2 Hyrid Numer Representation The level-index (LI) numer representation is to represent a positive real numer y x, where x, 0 x<, = φ ( x) = () φ ( x ) e, x, and φ is called the generalized exponential function. It follows that x = l + f, where the index f [0,) is given y f = ln(ln(...( ln ))), (2) the natural logarithm eing taken l times. So the level l must e a nonnegative integer. The symmetric level-index system presents a numer in (0, ) y the LI image of its reciprocal. Thus a real numer can e represented y ± r =± φ ( x) = s φ( l + f ), (3) and four pieces of information are needed to store a SLI numer -- numer sign s, level l, index f, and reciprocal sign r.
2 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) SLI numer representation has an essentially infinite representale numer range. It is sufficient to allocate ust 3 its to the level when working to any conceivale implemented precision, and the four asic arithmetic operations would e closed in the finite numer set of SLI representation. The details of LI and SLI numer representation and their algorithms for arithmetic operations are descried in [2], [4], [3], [], and [7]. It is not surprising that to perform arithmetic operations would e more complicated in the SLI system than in FLP arithmetic. Accordingly a hyrid system is proposed in [8] to take the advantages of oth SLI arithmetic and FLP arithmetic. If the magnitude of a numer is within a certain range, [2-5, 2 5 ] for example, the numer is represented in the IEEE standard form [5]. SLI numer representation is used otherwise. In this hyrid system, a doule precision numer can e packed into a 64-it word. See [8] for a possile representation scheme in a potential hardware implementation. However, it is not efficient to program this scheme in C++. We implemented the hyrid numer representation using a structure of total length of 70 its, as illustrated in Fig.. Note a SLI numer in this hyrid system is at 5 least level 4, since φ ( 4.57) 2. yte 8 ytes it field of length 3: 0: indicates an FLP numer; 4~7: the level l of an SLI numer. it field: numer sign s for SLI. it field: reciprocal sign r for SLI. not used doule: the value of an FLP numer; or the index f of an SLI numer. Fig. : SLI-FLP hyrid numer representation implemented in C++ This way no it manipulations are required, and the software implementation can run faster, with the tradeoff of a little extra space complexity. 3 Algorithms for Arithmetic Operations The algorithms implemented are ased on the modified algorithms for SLI arithmetic operations descried in []. Those modifications allow more parallel implementations in a potential hardware design. With a small change of initial calculations which will e descried later, the modified algorithms also enefit a software implementation. There are a few maor modifications to the algorithms in [], including the treatments of hyrid numer representation, and an approximation method ased on Taylor expansions for the algorithm of addition/sutraction. 3. Algorithm for Addition/Sutraction The addition/sutraction prolem is to solve the equation rz r r Z = sz φ ( z) = s φ( x) ± sφ( = ± (4) for s Z, r Z, z given s, s, r, r, x, y. We may assume r r φ( x ) φ( (or ) without losing generality. In the hyrid system, different paths of the algorithm will e executed for operands in different ranges. The figure elow displays which path would e chosen according to the larger magnitude operand in the addition/sutraction algorithm. pure FLP addition or sutraction pure SLI or mixed SLI-FLP, using Taylor approximation, or full algorithm φ (.0) φ(4.57) φ(5.84) E+2 trivial addition or sutraction Fig. 2: Domain decomposition of the algorithm for addition/sutraction in the hyrid system, when the larger magnitude operand satisfies > The domain decomposition is almost symmetric aout φ (.0) noticing φ (.0) = = φ(.0). So it is only necessary to show the numer line for >. Both SLI and FLP numers are used to denote magnitudes in the numer line. Notice a doule precision FLP numer can only reach 2 024, which is aout φ (4.632). The algorithm path in the second sudomain is most complex, and can not e shown in a single illustration. Figures of finer domain decomposition can e found in [7] and [8]. Trivial arithmetic operations are defined as the cases where the operation result equals to the larger magnitude operand. In doule precision arithmetic, addition/sutractions are all trivial except for φ( x) φ( x) if φ( x ) φ( ), so Z = and the algorithm is complete. The most eneficial modification in the algorithm is to adopt FLP arithmetic operations. A pure FLP addition or sutraction will e performed, if oth the
3 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) operands are within the reduced FLP range [2-5, 2 5 ]. It will e much faster than a pure SLI operation in any conceivale software implementations. If the larger magnitude operand is a FLP numer and the other operand is a SLI numer, it is safe to convert the SLI operand into FLP form and do a pure FLP operation. But for the other SLI-FLP mixed case, the SLI algorithm needs to e performed. The modified full algorithms are ased on computing sequences defined y a = / φ( x ); c = / φ( y ); = φ( z ) / φ( x ). (5) Assuming s = s = in equation (4) for simplicity, we give the full algorithm for SLI addition or sutraction, which is modified from [] as follows. Algorithm : Modified full SLI addition/sutraction of positive arguments for nontrivial cases Input (r, x), (r, r where r φ( x ) φ( and l, l 2. large= ( r == r == ); Initialize Booleans mixed = ( r! = r small = ( r r Z = r. Compute = exp( f ), a l = al = exp( / a ) ( = l = exp( f = exp( / ) ( = l a exp large a, a+ d = exp, mixed a a exp, small a c= ± d c= + r a ln c < l ), == r,...,2); );,...,2); == ). while and c a = +, c = + a ln c if c< a then z = + c / a, go to Output = l, h= f + ln c while h = +, h= ln h z = + h Output (r Z, z) Operator ± is denoted to compute the initial value of the c-sequence. It means that + is used for addition and - is used for sutraction. The computation of sequences in this algorithm is mathematically ut not numerically equivalent to what is defined in []. In order to avoid possile overflow/underflow prolems when generating the c-sequence with FLP internal operations, the initial value of the c-sequence is calculated in a different way. The new definition of the c-sequence is also more efficient to compute in a software implementation, y saving one exponential function evaluation. The tradeoff is that it requires oth operands to e at least level 2. But this will not e a prolem in the hyrid system, since then all SLI numers start from level 4. Another saving is that the flipover cases are all avoided. A flipover addition is defined as the case where the reciprocal sign of the larger addend is changed after a SLI addition. But any two SLI numers with different reciprocal signs are sufficiently distant in this hyrid system to avoid flipover additions, considering the limited precision of a 64-it numer representation. Algorithm is the full algorithm for pure SLI addition or sutractions. As shown in Fig. 2, the algorithm will e considered when the larger magnitude operand satisfies = s r x φ( x) and 2 5 < φ ( x ) < φ(5.84). There can e two simple variations for the algorithm, depending on the magnitude of the other operand. When is represented as a FLP numer in this hyrid system, it is not necessary to compute the -sequence. Notice only, the last value in the sequence, is useful in the later computations. It is possile to skip generating the -sequence in the SLI-FLP mixed case, y redefining d = exp( / a) (6) and performing a large addition in the rest of the algorithm. This variation can e easily verified according to the sequence definitions in (5). When has a magnitude sufficiently smaller than, the Taylor approximation scheme (see [7] for details) is applicale and the computation of the c-sequence can e avoided. In this particular implementation, a linear interpolation is performed for each addition or sutraction to decide if the first order Taylor approximation method is useful. If it is, calculate
4 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) d, large or mixed ε = a a... 2 al (7) d /( d+ ), small and output ( r, x± ε ). The approximation of ε is ased on a different expression than in [7], ecause the original full algorithm is used in [7], while the modified algorithm is adapted in this paper. However, the formula deduction of ε is very similar. 3.2 Error Bounds in Implementation Since all the internal operations are performed in standard doule precision FLP arithmetic, the error of the implemented SLI arithmetic operations is larger than what is predicted similarly as in [4]. When performing an SLI addition, we assume that the sequence {a } is stored with asolute precision γ while all the other quantities are stored to asolute precisionγ. Let δz represent the error of z caused y inherent errors δ x in x and δ y in y. As stated in [4], δ z in a large addition satisfies δz c + γ l Z (8) (2ρ+ 2) γ + (/ e lnγ ) ρλγ where ρ= + / φ' () + / φ'(2) (9) and e λ = ( 4+ e ) e (0) On replacing ρ, λ and e y their numerical values, the result reduces to δz 6.784γ + ( lnγ ) γ () Due to the restriction of FLP arithmetic, the internal operations in this software implementation have the precision of Sustituting othγ andγ with 2-52 in (), we computed the error δ z in a large addition is ounded y approximately , and similar error ounds can e otained for mixed and small cases. The largest 4 among the error ounds is , which would e acceptale for most computations. Although the aove error analysis is ased on the full algorithm for pure SLI addition, the error ounds also work for the variations of the algorithm. The SLI-FLP mixed case is expected to have a etter precision since the roundoff error in generating the -sequence is avoided. The Taylor approximation is deemed to e applicale only when its result perfectly matches the result of the full algorithm at the expected precision level, so the approximation method does not introduce any further error to the implementation. Sutractions in this implementation have similar errors, unless cancellations occur. The correctness testing in section 4 supports the error analysis in this section. 3.3 Algorithm for Multiplication/Division The domain decomposition of multiplication/division is similar to the one for addition/sutraction, except that trivial cases start from a different numer. The threshold is aout φ( 6.839) for multiplication/ division in doule precision SLI arithmetic. The full algorithm for multiplication or division is also modified from []. But note here φ( x) φ( r instead of r φ( x ) φ( is required for a pure SLI multiplication/division. Algorithm 2: Modified full SLI multiplication/ division of positive arguments for nontrivial cases Input (r, x), (r, where φ( x) φ( and l, l 3. Initialize Booleans large, mixed, small, r Z = r. Compute = exp( f ), a l al = exp( / a = exp( f ), = exp( / ) ( = l a2 ± exp a22 c = a2 m exp a22 c= ± a ln c 2 ) ( = l 2 2,,,...,3);,...,3); large or small mixed = 2 while < l and c a = +, c = + a ln c if c< a then if = 2 and c < exp( / a2 ) then z = + c / exp( / a2 ), go to Output else z = + c / a, go to Output = l, h= f + ln c while h = +, h= ln h z = + h Output (r Z, z)
5 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) When a ± operation appears in this algorithm, + should e used for multiplication and - would e used for division. This algorithm can also have variations to make it run faster for some special cases. However, the Taylor approximation method is not very helpful for multiplication/division, since its applicale domain is very limited. The SLI-FLP mixed case can still simplify the prolem. We first swap with if the leading operand is an FLP numer. Then the value of c can e computed y ± exp( / a2 ) ln, largeor mixed c = (2) m exp( / a2 ) ln, small Again the -sequence is not needed. The multiplication/division algorithm is expected to have similar error as the addition algorithm, unless cancellations happen. 3.4 Algorithm for Powering Operation It is possile to derive a similar algorithm for powering operation, ut there would e many special cases to consider. So the powering operation was implemented y calling the suroutine of multiplication. For example, if φ ( φ ( z) = φ( x), (3) taking logarithms of oth sides of the equation, we will get φ( z ) = φ( x ) φ(. (4) So the large case of powering prolem ecomes a multiplication prolem at different levels. However, a separate powering algorithm could e marginally faster ecause of the saving of extra function calls. 4 Testing One important purpose of this software implementation is to promote the use of SLI arithmetic in practical scientific computation, so the correctness and the performance of the program are oth critical. A systematic testing procedure was designed and executed, so that we can ensure the usefulness of the implementation y providing the testing results. 4. Correctness Testing We are not ale to directly test the correctness of this SLI-FLP hyrid system. It is easy to verify the cases where FLP arithmetic operations are performed, ut it will e hard to tell if the results are correct for numers that exceed the doule precision FLP representale range, especially for cases using the Taylor approximation method. So our testing egan from the pure SLI system using only the full original algorithm introduced in [4]. The original algorithm is identical to the modified algorithm in [] except for the definitions of the -sequence. But there are fewer restrictions that are needed for a pure SLI system using FLP internal operations. We may compare the results from pure SLI arithmetic with the ones from FLP arithmetic if the magnitudes of testing data are ounded, so that the operations will not cause overflow or underflow in FLP arithmetic. A large numer of such tests are ale to cover all ranches of the algorithm. If the implementation gives correct results for all tests in the FLP range, we may reason that the algorithm remains correct for numers that exceed this range, ecause all cases in the pure SLI system are essentially the same computation at different levels. Next we can test the hyrid arithmetic ased on the pure SLI system. The agreement of their results in arithmetic operations is enough to conclude the correctness of the implementation of the hyrid system. To test the pure SLI arithmetic using only the full original algorithm, the testing cases were chosen oth y hand and y a random numer generator. 0,000 pairs of random operands with a log-normal distriution in magnitudes, as shown in Fig. 3, were generated for the testing of the four asic arithmetic operations. The log-normal distriution is the est choice for the testing cases among the well known distriutions, ecause the testing needs to cover a range of doule precision FLP numers as large as possile, ut at the same time, sufficient testing cases need to e picked around, in order to test all the three flipover cases which appear infrequently. Fig. 3: Cumulative distriution of the correctness testing data for asic arithmetic operations in the pure SLI system
6 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) The random operands for testing the powering operation could e generated similarly. But FLP overflow/underflow happens more frequently in powering than in the asic arithmetic operations, so the numer range of the testale cases is very limited, and a normal distriution is used instead. A testing tool in LINU called GCOV is used to verify the coverage of all ranches of the algorithm. When some cases with a true zero in operations are manually added, every line in the arithmetic operation suroutines is covered in testing. We claim a test successful if the result in SLI arithmetic and the result in FLP arithmetic differ y no more than a small tolerance. According to the error ounds predicted in Section 3.2, a tolerance of is used in the index. The FLP result of an operation is converted into an SLI numer, and its index is compared with the index of the SLI result, in the situation that oth results have the same level in SLI forms. 4 Using the tolerance , all tests of addition/sutraction were successful. A few tests 4 would fail if a smaller tolerance such as 2 0 is used. The results verified the error ounds predicted in section 2. Almost all the tests of multiplication/division and powering operation succeeded with the same error tolerance. A few exceptions were oserved, since cancellations occur more often in multiplications and divisions, with the log-normal distriuted testing data. Fig. 4: Cumulative distriution of the correctness testing data for arithmetic operations in the SLI-FLP hyrid system Next we tested the implementation of the hyrid system. The random numer generator can now work with SLI numers to get a proper distriution of testing data, and the uniform distriution, as shown in Fig. 4, works well for the testing of all arithmetic operations, including powering. Note the signs of the horizontal coordinates denote for the reciprocal signs of SLI numers instead of numer signs. The reason for having a horizontal line segment in the center is that φ (.0) = / φ(.0), and the length of this line segment is zero in SLI arithmetic. For the hyrid system, we have tested 0,000 pairs of random operands following a uniform distriution in magnitude, plus a few special cases manually added. All ranches of the algorithm were tested, and the results matched the ones from FLP arithmetic or from the well tested pure SLI system. Hence we conclude that to perform arithmetic operations in this SLI-FLP hyrid system is reliale. 4.2 Performance Testing In order to evaluate the performance, the time costs of performing arithmetic operations in the SLI implementation will e compared to the costs in FLP arithmetic. However, the SLI arithmetic was programmed in C++ as a class, and has a lot of overhead in running time, while the FLP arithmetic was uilt in chips. The results of a direct comparison will not reflect the efficiency difference etween their algorithms. An FLP class was then programmed to make the comparison fairer. In this performance comparison we still run the functions defined y ANSI C++ to do FLP arithmetic operations, ut all the operations are now encapsulated into a class, in order to add similar overhead to FLP computations as the ones SLI arithmetic has in the software implementation. Note the comparison is not yet fair for SLI arithmetic, since the logical structure of the algorithm cannot e efficiently programmed in a high level language. The performance testing was done for four types of arithmetic operations -- addition/sutraction, multiplication, division and powering. 0,000 random numers were generated as operands, and each operation etween any two numers was repeated thousands of times for a more accurate comparison. Because the hyrid system uses different algorithms to perform arithmetic operations for operands in different numer ranges, we made three tests with different sets of testing data. All three sets of data follow a uniform distriution in SLI representation, ut with various numer ranges as shown in Tale. The numer range specified in the tale is only for those greater or equal to. If a numer is etween 0 and, it must e within the reciprocal of the corresponding range. For example, must e within 022 (2,) in data set. There are negative numers
7 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Tale : Properties of data sets used in performance testing Data set Numer range (for those. 0 ) Operands in FLP over/underflow Results in FLP over/underflow (,2 ) 0% 3.3% 2 ( φ (4.6322), φ(7.0)) 00% 00% 3 (, φ (7.0)) 39.09% 50.05% as well, and their asolute values fall in the same numer ranges. Data set contains only numers in the doule precision FLP representale range. However, it is possile that the results of arithmetic operations overflow or underflow in FLP arithmetic, especially in powering operations. The performance of the implementation in this numer range is our maor concern, since most practical computations are still in this range. The time costs of other operations in different systems are shown in the following tale, providing that an FLP addition/sutraction costs one time unit. The experiments were performed using a desktop with a 3GHz Pentium 4 CPU. Tale 2: Time comparison for operands in doule precision FLP range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / The pure SLI system used in comparison is implemented ased on the original algorithm without the Taylor approximation method. The results in Tale 2 clearly show that the hyrid system enefits a lot from using FLP arithmetic in an appropriate numer range. The hyrid system costs less than five times the FLP arithmetic does. The cost ratio will e even etter in practice, since a real life prolem usually spends a large portion of time on operations other than real numer computations. See [8] for an example. Tale 3: Time comparison for operands eyond FLP range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / Data set 2 contains numers eyond doule precision FLP range. In this numer range we may tell how the Taylor approximation scheme and the other modifications to the algorithm enefit the performance of SLI arithmetic operations. The time comparisons are displayed in Tale 3. Note that the FLP results are all exceptions (0, Inf or NaN), so the times indicated do not reflect meaningful results. Data set 3 is used to evaluate the overall performance of the hyrid system, so oth FLP numers and SLI numers are included. Tale 4: Time comparison for operands uniformly distriuted in the hyrid numer representale range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / In Tale 4, the hyrid system clearly shows its advantage over the pure SLI system without the Taylor approximation scheme. The overall performance is almost douled for most operations. Although the FLP arithmetic is still much faster, it does not always give desirale results. As shown in Tale, 39% of numers and 50% of operations overflow or underflow in FLP arithmetic for this data set. The performance testing shows that the hyrid system works much faster than a pure SLI system, and its performance is acceptale even compared with a pure FLP system, when a comparison is appropriate. 5 Conclusion The software implementation of SLI-FLP hyrid arithmetic descried in this paper is roust and ready to e used in practical computations. The numer representation scheme and the algorithms for arithmetic operations were all modified, with the goal of eing efficiently implemented using a high level computer language. In order to ensure the reliaility and efficiency of the implementation, oth correctness testing and performance testing were carefully designed and executed. With acceptale efficiency, this C++ lirary can expediently help mathematicians, engineers and
8 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) programmers to control overflow and underflow prolems in computing. We hope the implementation also help to motivate further research on SLI arithmetic, y ringing it to the interest of more people who need its advantages. References: [] M.A. Anuta, D.W. Lozier, N. Schaanel & P.R. Turner, Basic Linear Algera Operations in SLI Arithmetic, Computing and Applied Mathematics Laoratory (Applied and Computational Mathematics Division), NIST Report, NISTIR58, 996. [2] C.W. Clenshaw & F.W.J. Olver, Level-index Arithmetic Operations, SIAM J. Numer. Anal. 24, 987, [3] C.W. Clenshaw, F.W.J. Olver & P. R. Turner, Level-Index Arithmetic: An Introductory Survey, Numerical Analysis and Parallel Processing (P.R. Turner, ed.), Springer-Verlag, Berlin, 989, [4] C.W. Clenshaw & P.R. Turner, The Symmetric Level-Index System, IMA J. Numer. Anal. 8, 988, [5] IEEE 754/854, IEEE Standard for Floating Point Arithmetic, ANSI/IEEE Std. Vols 754/854, IEEE, New ork. [6] D.W. Lozier & P.R. Turner, Symmetric Level Index Arithmetic in Simulation and Modeling, J. Res. Natl. Inst. Stand. Technol. 97, 992, [7]. Shen & P.R. Turner, Taylor Approximation for Symmetric Level-Index Arithmetic Processing, IMA J. Numer. Anal.26, 2006, [8]. Shen & P.R. Turner, A Hyrid Numer Representation Scheme Based on Symmetric Level-Index Arithmetic, CSC'06 (WORLDCOMP'06), CSREA Press, Las Vegas, 2006, [9] P.R. Turner, A Software Implementation of SLI Arithmetic, Proc. ARITH9, IEEE Computer Society, Washington DC, 989, 8-24.
G Force Tolerance Sample Solution
G Force Tolerance Sample Solution Introduction When different forces are applied to an oject, G-Force is a term used to descrie the resulting acceleration, and is in relation to acceleration due to gravity(g).
More informationRecent Results from Analyzing the Performance of Heuristic Search
Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu
More informationCS321 Introduction To Numerical Methods
CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types
More information/06/$20.00 c 2006 IEEE I. INTRODUCTION
Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract
More information2 Computation with Floating-Point Numbers
2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers
More information2 Computation with Floating-Point Numbers
2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers
More informationTable : IEEE Single Format ± a a 2 a 3 :::a 8 b b 2 b 3 :::b 23 If exponent bitstring a :::a 8 is Then numerical value represented is ( ) 2 = (
Floating Point Numbers in Java by Michael L. Overton Virtually all modern computers follow the IEEE 2 floating point standard in their representation of floating point numbers. The Java programming language
More informationIntroduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs
CS 189 Introduction to Machine Learning Spring 2018 Note 21 1 Sparsity and LASSO 1.1 Sparsity for SVMs Recall the oective function of the soft-margin SVM prolem: w,ξ 1 2 w 2 + C Note that if a point x
More informationAnalyzing the Performance of Pattern Database Heuristics
Analyzing the Performance of Pattern Dataase Heuristics Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 korf@cs.ucla.edu Astract We introduce a model
More informationComp Online Algorithms
Comp 7720 - Online Algorithms Assignment 1: Introduction, Searching & List Update Shahin Kamalli University of Manitoa - Fall 2018 Due: Thursday, Octoer 4th at 11:59 pm Octoer 29, 2018 The real prolem
More informationMath 340 Fall 2014, Victor Matveev. Binary system, round-off errors, loss of significance, and double precision accuracy.
Math 340 Fall 2014, Victor Matveev Binary system, round-off errors, loss of significance, and double precision accuracy. 1. Bits and the binary number system A bit is one digit in a binary representation
More informationFormal verification of IA-64 division algorithms
Formal verification of IA-64 division algorithms John Harrison Intel Corporation, EY2-03 5200 NE Elam Young Parkway Hillsoro, OR 97124, USA Astract. The IA-64 architecture defers floating point and integer
More informationTheory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description
Theory of ntegers This lecture: Decision procedure for qff theory of integers CS389L: Automated Logical Reasoning Lecture 13: The Omega Test şıl Dillig As in previous two lectures, we ll consider T Z formulas
More informationThe Codesign Challenge
ECE 45: Hardware/Software Codesign Codesign Challenge Fall 21 The Codesign Challenge Ojectives In the codesign challenge, your task is to accelerate a given software reference implementation as much as
More informationMAT128A: Numerical Analysis Lecture Two: Finite Precision Arithmetic
MAT128A: Numerical Analysis Lecture Two: Finite Precision Arithmetic September 28, 2018 Lecture 1 September 28, 2018 1 / 25 Floating point arithmetic Computers use finite strings of binary digits to represent
More informationArray Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont
Theory of Integers CS389L: Automated Logical Reasoning Omega Test Işıl Dillig Earlier, we talked aout the theory of integers T Z Signature of T Z : Σ Z : {..., 2, 1, 0, 1, 2,..., 3, 2, 2, 3,..., +,, =,
More informationTwo Kinds of Golden Triangles, Generalized to Match Continued Fractions
Journal for Geometry and Graphics Volume (2007), No. 2, 65 7. Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Clark Kimerling Department of Mathematics, University of Evansville
More informationParallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security ISC 2002, Springer-Verlag LNCS 2433, pp. 402 413, ISBN 3-540-44270-7. Notes added 2002-10-16. Parallelizale Elliptic Curve Point
More informationFloating-Point Numbers in Digital Computers
POLYTECHNIC UNIVERSITY Department of Computer and Information Science Floating-Point Numbers in Digital Computers K. Ming Leung Abstract: We explain how floating-point numbers are represented and stored
More informationMisbehavior and MAC Friendliness in CSMA Networks
Misehavior and MAC Friendliness in CSMA Networks Zhefu Shi, Cory Beard, Ken Mitchell, University of Missouri-Kansas City Contact: eardc@umkcedu Astract Nodes using standardized, contention-ased CSMA protocols
More informationMathematical preliminaries and error analysis
Mathematical preliminaries and error analysis Tsung-Ming Huang Department of Mathematics National Taiwan Normal University, Taiwan August 28, 2011 Outline 1 Round-off errors and computer arithmetic IEEE
More informationFloating-Point Numbers in Digital Computers
POLYTECHNIC UNIVERSITY Department of Computer and Information Science Floating-Point Numbers in Digital Computers K. Ming Leung Abstract: We explain how floating-point numbers are represented and stored
More informationA Graph-Based Web Usage Mining Considering Page Browsing Time
A Graph-Based We Usage Mining Considering Page Browsing Time Koichiro Mihara Masahiro Terae Kazuo Hashimoto Graduate School of Information Sciences, TOHOKU University {mihara, terae, kh}@aiet.ecei.tohoku.ac.jp
More informationFloating-point representation
Lecture 3-4: Floating-point representation and arithmetic Floating-point representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However,
More informationComputational Mathematics: Models, Methods and Analysis. Zhilin Li
Computational Mathematics: Models, Methods and Analysis Zhilin Li Chapter 1 Introduction Why is this course important (motivations)? What is the role of this class in the problem solving process using
More informationData-analysis problems of interest
Introduction 3 Data-analysis prolems of interest. Build computational classification models (or classifiers ) that assign patients/samples into two or more classes. - Classifiers can e used for diagnosis,
More informationGybeh' c.s 9 Springer-Verlag 1993
Biol. yern. 69, 345-351 (1993) Blogr =- Gyeh' c.s 9 Springer-Verlag 1993 Solution of the direct and inverse kinematic prolems y a common algorithm ased on the mean of multiple computations H. ruse, U.
More informationName Class Date. Quadratic Functions and Transformations
4-1 Reteaching Parent Quadratic Function The parent quadratic function is y = x. Sustitute 0 for x in the function to get y = 0. The vertex of the parent quadratic function is (0, 0). A few points near
More informationBindel, Fall 2016 Matrix Computations (CS 6210) Notes for
1 Logistics Notes for 2016-09-07 1. We are still at 50. If you are still waiting and are not interested in knowing if a slot frees up, let me know. 2. There is a correction to HW 1, problem 4; the condition
More informationBasics of Computation. PHY 604:Computational Methods in Physics and Astrophysics II
Basics of Computation Basics of Computation Computers store information and allow us to operate on it. That's basically it. Computers have finite memory, so it is not possible to store the infinite range
More informationIntroduction to MATLAB
Chapter 1 Introduction to MATLAB MATLAB Matrix Laoratory A special-purpose program optimized to perform engineering and scientific calculations Chapter M1: Introduction to MATLAB 1 MATLAB Integrated development
More informationTruncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4.
Chapter 4: Roundoff and Truncation Errors Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4. 1 Outline Errors Accuracy and Precision
More informationBinary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University
Binary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University Computational Boolean Algera Representations Applying unate recursive paradigm (URP) in solving tautology is a great warm up example.
More informationReview of Calculus, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-10 Lecture 4 Notes These notes correspond to Sections 1.1 1.2 in the text. Review of Calculus, cont d Taylor s Theorem, cont d We conclude our discussion of Taylor
More informationSolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society suject matter experts for pulication in the IEEE INFOCOM 2 proceedings This paper was presented as part of the Mini-Conference
More informationy ax bx c y a x h 2 Math 11 Pre-Cal Quadratics Review
Math 11 Pre-Cal Quadratics Review A quadratic function can e descried as y ax x c (or equivalent forms, see elow). There are an infinite numer of solutions (x,y pairs) to a quadratic function. If we plot
More informationDCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs
: Deadline-aware Resource Allocation for Cloud Computing Jos Dan Li, Congjie Chen, Junjie Guan, Ying Zhang, Jing Zhu, Ruozhou Yu Tsinghua University HP Las Astract With the tremendous growth of cloud computing,
More informationOCR J276 GCSE Computer Science
Name: Class Teacher: Date: OCR J76 GCSE Computer Science MARK SCHEME.6 DATA REPRESENTATION Content in J76 GCSE Computer Science: 1.1 Systems Architecture 1. Memory 1.3 Storage 1.4 Wireless and Wired Networks
More informationReview Questions 26 CHAPTER 1. SCIENTIFIC COMPUTING
26 CHAPTER 1. SCIENTIFIC COMPUTING amples. The IEEE floating-point standard can be found in [131]. A useful tutorial on floating-point arithmetic and the IEEE standard is [97]. Although it is no substitute
More informationMost nonzero floating-point numbers are normalized. This means they can be expressed as. x = ±(1 + f) 2 e. 0 f < 1
Floating-Point Arithmetic Numerical Analysis uses floating-point arithmetic, but it is just one tool in numerical computation. There is an impression that floating point arithmetic is unpredictable and
More informationCalculation Enhancement of Chebyshev Polynomial over Z p ABSTRACT
Malaysian Journal of Mathematical Sciences 7(S): 131-143 (2013) Special Issue: The 3 rd International Conference on Cryptology & Computer Security 2012 (CRYPTOLOGY2012) MALAYSIAN JOURNAL OF MATHEMATICAL
More information1. GRAPHS OF THE SINE AND COSINE FUNCTIONS
GRAPHS OF THE CIRCULAR FUNCTIONS 1. GRAPHS OF THE SINE AND COSINE FUNCTIONS PERIODIC FUNCTION A period function is a function f such that f ( x) f ( x np) for every real numer x in the domain of f every
More informationANSI: A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks q,qq
Journal of Systems Architecture xxx (6) xxx xxx www.elsevier.com/locate/sysarc : A swarm intelligence-ased unicast routing protocol for hyrid ad hoc networks q,qq Sundaram Rajagopalan *, Chien-Chung Shen
More informationPedestrian Detection Using Structured SVM
Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.
More information- Introduction P. Danziger. Linear Algebra. Algebra Manipulation, Solution or Transformation
Linear Algera Linear of line or line like Algera Manipulation, Solution or Transformation Thus Linear Algera is aout the Manipulation, Solution and Transformation of line like ojects. We will also investigate
More information1 Model checking and equivalence checking
978--52-85972- - Practical Design Verification Model checking and equivalence checking Masahiro Fujita. Introduction Owing to the advances in semiconductor technology, a large and complex system that has
More informationReal-Time Median Filtering for Embedded Smart Cameras
Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual
More informationMulti Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters
Applied mathematics in Engineering, Management and Technology 2 (5) 214:177-183 www.amiemt-journal.com Multi Ojective Reconfiguration of Distriution Networks with the Ojective to Reduce Losses and Improving
More informationFloating Point Considerations
Chapter 6 Floating Point Considerations In the early days of computing, floating point arithmetic capability was found only in mainframes and supercomputers. Although many microprocessors designed in the
More informationReverse order Triangular, Trapezoidal and Pentagonal Fuzzy Numbers
nnals of Pure and pplied Mathematics Vol. 9, No., 205, 07-7 ISSN: 2279-087X (P), 2279-0888(online) Pulished on 20 January 205 www.researchmathsci.org nnals of Reverse order Triangular, Trapezoidal and
More informationPERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN
1 PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN M. Gerla, S. S. Lee y G. Reali, D. D. Sorte z y Computer Science Dept., UCLA Los Angeles, CA, U.S.A. z Dipartimento di Ingegneria
More informationRECONSTRUCTING FINE-SCALE AIR POLLUTION STRUCTURES FROM COARSELY RESOLVED SATELLITE OBSERVATIONS
RECONSTRUCTING FINE-SCALE AIR POLLUTION STRUCTURES FROM COARSELY RESOLVED SATELLITE OBSERVATIONS Dominik Brunner, Daniel Schau, and Brigitte Buchmann Empa, Swiss Federal Laoratories for Materials Testing
More informationA Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 2 (Jul. - Aug. 2013), PP 13-18 A Novel Approach of Area-Efficient FIR Filter
More informationCSE Discrete Structures
CSE 2315 - Discrete Structures Homework 3- Solution - Fall 2010 Due Date: Oct. 28 2010, 3:30 pm Sets 1. Rewrite the following sets as a list of elements. (8 points) a) {x ( y)(y N x = y 3 x < 30)} {0,
More informationA Floating-Point Fused Dot-Product Unit
A Floating-Point Fused Dot-Product Unit Hani H. Saleh Earl E. Swartzlander, Jr. Intel Corporation ECE Department 5000 Plaza on the Lake Blvd. University of Texas at Austin Austin, TX 78746 Austin, TX 787
More informationFAST AND ROBUST RECURSIVE FILTER FOR IMAGE DENOISING. Yiheng Chi and Stanley H. Chan
FAST AND ROBUST RECURSIVE FILTER FOR IMAGE DENOISING Yiheng Chi and Stanley H. Chan School of ECE and Dept of Statistics, Purdue University, West Lafayette, IN 47907. ABSTRACT Image denoising on moile
More informationVLSI Logic Test, Validation and Verification Lecture 7 Properties & Applications of Binary Decision Diagrams
VLSI Logic Test, Validation and Verification Lecture 7 Properties & Applications of Binary Decision Diagrams 1 Instructor: Priyank Kalla Department of Electrical and Computer Engineering University of
More informationCaching Policies for In-Network Caching
Caching Policies for In-Network Caching Zhe Li, Gwendal Simon, Annie Gravey Institut Mines Telecom - Telecom Bretagne, UMR CNRS 674 IRISA Université Européenne de Bretagne, France {firstname.lastname}@telecom-retagne.eu
More informationGeneral Approach to Modelling Operation Threats and Extreme Weather Hazards Impact on Critical Infrastructure Safety
Kołowrocki Krzysztof ORCID ID: -2-4836-4976 Journal of Polish Safety and Reliaility Association Summer Safety and Reliaility Seminars, Volume 8, Numer 3, 217 Soszyńska-Budny Joanna ORCID ID: -3-1525-9392
More informationVertex 3-colorability of claw-free graphs
R u t c o r Research R e p o r t Vertex 3-coloraility of claw-free graphs M. Kamiński a V. Lozin RRR 8 2007, Feruary 2007 RUTCOR Rutgers Center for Operations Research Rutgers University 640 Bartholomew
More informationHot X: Algebra Exposed
Hot X: Algera Exposed Solution Guide for Chapter 5 Here are the solutions for the Doing the Math exercises in Hot X: Algera Exposed! (assume that all denominators 0) DTM from p.59 2. Since they have the
More information6 th Grade Mathematics Instructional Week 25 Develop and Use Formulas to Determine the Volume and Surface Area of Rectangular Prisms Paced Standards:
6 th Grade Mathematics Instructional Week 25 Develop and Use Formulas to Determine the Volume and Surface Area of Rectangular Prisms Paced Standards: 6.GM.4: Find the area of complex shapes composed of
More informationAgus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia
A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,
More informationClasses of Real Numbers 1/2. The Real Line
Classes of Real Numbers All real numbers can be represented by a line: 1/2 π 1 0 1 2 3 4 real numbers The Real Line { integers rational numbers non-integral fractions irrational numbers Rational numbers
More informationBinary floating point encodings
Week 1: Wednesday, Jan 25 Binary floating point encodings Binary floating point arithmetic is essentially scientific notation. Where in decimal scientific notation we write in floating point, we write
More informationUmbrella : A novel fixed-size DHT protocol
Umrella : A novel fixed-size DHT protocol A. D. Sotiriou, P. Kalliaras, P. Papageorgiou, N. Mitrou Computer Network Laoratory, School of Electrical and Computer Engineering National Technical University
More informationT Parallel and Distributed Systems (4 ECTS)
T 79.4301 Parallel and Distriuted Systems (4 ECTS) T 79.4301 Rinnakkaiset ja hajautetut järjestelmät (4 op) Lecture 4 11th of Feruary 2008 Keijo Heljanko Keijo.Heljanko@tkk.fi T 79.4301 Parallel and Distriuted
More information' After the ZS-1 prototypes were made operational, a new floating
An Accurate, High Speed Implementation of Division y Reciprocal Approximation D. L. Fowler and J. E. Smith Astronautics Corporation of America 5800 Cottage Grove Rd. Madison, Wisconsin 53716 Astract Newton-Raphson
More informationComputational Economics and Finance
Computational Economics and Finance Part I: Elementary Concepts of Numerical Analysis Spring 2015 Outline Computer arithmetic Error analysis: Sources of error Error propagation Controlling the error Rates
More informationGSE Third Grade Curriculum Map
GSE Third Grade Curriculum Map Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Numers and Operations in Base Ten The Relationship Between Multiplication and Division Patterns in Addition and Multiplication
More informationFair inter-tap routing and backhaul assignment for wireless mesh networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mo. Comput. (2008) Pulished online in Wiley InterScience (www.interscience.wiley.com).629 Fair inter-tap routing and ackhaul assignment for wireless
More informationChap5 The Theory of the Simplex Method
College of Management, NCTU Operation Research I Fall, Chap The Theory of the Simplex Method Terminology Constraint oundary equation For any constraint (functional and nonnegativity), replace its,, sign
More informationCS 188: Artificial Intelligence Fall Search Gone Wrong?
CS 188: Artificial Intelligence Fall 2009 Lecture 3: A* Search 9/3/2009 Pieter Aeel UC Berkeley Many slides from Dan Klein Search Gone Wrong? 1 Announcements Assignments: Project 0 (Python tutorial): due
More informationUNIT 10 Trigonometry UNIT OBJECTIVES 287
UNIT 10 Trigonometry Literally translated, the word trigonometry means triangle measurement. Right triangle trigonometry is the study of the relationships etween the side lengths and angle measures of
More informationLecture Objectives. Structured Programming & an Introduction to Error. Review the basic good habits of programming
Structured Programming & an Introduction to Error Lecture Objectives Review the basic good habits of programming To understand basic concepts of error and error estimation as it applies to Numerical Methods
More informationCS 450 Numerical Analysis. Chapter 7: Interpolation
Lecture slides based on the textbook Scientific Computing: An Introductory Survey by Michael T. Heath, copyright c 2018 by the Society for Industrial and Applied Mathematics. http://www.siam.org/books/cl80
More informationConvex Pentagons that can Tessellate the Plane
Casey Mann (University of Washington Bothell) Jennifer McLoud (University of Washington Bothell) David Von Derau (University of Washington Bothell) 2016 PNACP Meeting Portland Community College April 1,
More informationWe use L i to stand for LL L (i times). It is logical to define L 0 to be { }. The union of languages L and M is given by
The term languages to mean any set of string formed from some specific alphaet. The notation of concatenation can also e applied to languages. If L and M are languages, then L.M is the language consisting
More informationNumerical Robustness in Geometric Computation: An Expository Summary
Appl. Math. Inf. Sci. 8, No. 6, 2717-2727 (2014) 2717 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080607 Numerical Roustness in Geometric Computation:
More informationScientific Programming in C VI. Common errors
Scientific Programming in C VI. Common errors Susi Lehtola 6 November 2012 Beginner errors If you re a beginning C programmer, you might often make off-by one errors when you use arrays: #i n c l u de
More informationRBFT: Redundant Byzantine Fault Tolerance
RBFT: Redundant Byzantine Fault Tolerance Pierre-Louis Aulin Grenole University Sonia Ben Mokhtar CNRS - LIRIS Vivien Quéma Grenole INP Astract Byzantine Fault Tolerant state machine replication (BFT)
More informationParallel algorithms for fast air pollution assessment in three dimensions
HPC-UA 2014 (Ukraine, Kyiv, Octoer 14, 2014) Parallel algorithms for fast air pollution assessment in three dimensions Bohaienko V.O. 1 1 Glushkov Institute of Cyernetic of NAS of Ukraine, Kyiv, Ukraine
More informationESTIMATING AND CALCULATING AREAS OF REGIONS BETWEEN THE X-AXIS AND THE GRAPH OF A CONTINUOUS FUNCTION v.07
ESTIMATING AND CALCULATING AREAS OF REGIONS BETWEEN THE X-AXIS AND THE GRAPH OF A CONTINUOUS FUNCTION v.7 In this activity, you will explore techniques to estimate the "area" etween a continuous function
More informationResponse time analysis in AFDX networks
Response time analysis in AFDX networks J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de Cantaria, 39005-Santander, SPAIN {gutierjj, palencij,
More informationGeorgia Standards of Excellence 3.2 Curriculum Map
Georgia Standards of Excellence 3.2 Curriculum Map Georgia Standards of Excellence: Curriculum Map 3 rd Grade Unit 4 3 rd Grade Unit 5 3 rd Grade Unit 6 Unit 1 Unit 2 Unit 3 Unit 4 Geometry Representing
More informationNetwork Game Traffic Modelling
Network Game Traffic Modelling Johannes Färer University of Stuttgart, Inst. of Communication Networks and Computer Engineering Pfaffenwaldring, 9 Stuttgart, Germany E-mail: faerer@ind.uni-stuttgart.de
More informationLECTURE 0: Introduction and Background
1 LECTURE 0: Introduction and Background September 10, 2012 1 Computational science The role of computational science has become increasingly significant during the last few decades. It has become the
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationCS6303 COMPUTER ARCHITECTURE LESSION NOTES UNIT II ARITHMETIC OPERATIONS ALU In computing an arithmetic logic unit (ALU) is a digital circuit that performs arithmetic and logical operations. The ALU is
More information1.2 Round-off Errors and Computer Arithmetic
1.2 Round-off Errors and Computer Arithmetic 1 In a computer model, a memory storage unit word is used to store a number. A word has only a finite number of bits. These facts imply: 1. Only a small set
More informationFloating-Point Arithmetic
ENEE446---Lectures-4/10-15/08 A. Yavuz Oruç Professor, UMD, College Park Copyright 2007 A. Yavuz Oruç. All rights reserved. Floating-Point Arithmetic Integer or fixed-point arithmetic provides a complete
More informationBits, Words, and Integers
Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are
More informationRoundoff Errors and Computer Arithmetic
Jim Lambers Math 105A Summer Session I 2003-04 Lecture 2 Notes These notes correspond to Section 1.2 in the text. Roundoff Errors and Computer Arithmetic In computing the solution to any mathematical problem,
More informationfractional quantities are typically represented in computers using floating point format this approach is very much similar to scientific notation
Floating Point Arithmetic fractional quantities are typically represented in computers using floating point format this approach is very much similar to scientific notation for example, fixed point number
More informationFloating Point Arithmetic
Floating Point Arithmetic Floating point numbers are frequently used in many applications. Implementation of arithmetic units such as adder, multiplier, etc for Floating point numbers are more complex
More informationVISUAL LANE DETECTION ALGORITHM USING THE PERSPECTIVE TRANSFORM
Proceedings of the Fourteenth Annual Early Career Technical Conference The University of Alaama, Birmingham ECTC 04 Novemer, 04 - Birmingham, Alaama USA VISUAL LANE DETECTION ALGORITHM USING THE PERSPECTIVE
More informationFloating Point. CSE 351 Autumn Instructor: Justin Hsia
Floating Point CSE 351 Autumn 2016 Instructor: Justin Hsia Teaching Assistants: Chris Ma Hunter Zahn John Kaltenbach Kevin Bi Sachin Mehta Suraj Bhat Thomas Neuman Waylon Huang Xi Liu Yufang Sun http://xkcd.com/899/
More informationSEARCHING, SORTING, AND ASYMPTOTIC COMPLEXITY
1 A3 and Prelim 2 SEARCHING, SORTING, AND ASYMPTOTIC COMPLEXITY Lecture 11 CS2110 Fall 2016 Deadline for A3: tonight. Only two late days allowed (Wed-Thur) Prelim: Thursday evening. 74 conflicts! If you
More information15th Special Course on Image Processing for Industrial Applications October, 2000, Delft, The Netherlands. 1. Lab exercises: Mathematical Morphology
1. La exercises: Mathematical Morphology In these la exercises we will use matla and the SDC morphology toolox, a special lirary for mathematical morphological image processing. A demo version of this
More informationFrom this result, it ecomes evident that y estimating the components of projected motion (i.e. u = v x cos( )+v y sin( )), for at least two independen
Efficiency and Accuracy Tradeoffs in using Projections for Motion Estimation Λ Dirk Roinson Peyman Milanfar Department of Electrical Engineering Department of Electrical Engineering University of California
More information