Spanning Tree Based State Encoding for Low Power Dissipation

Size: px
Start display at page:

Download "Spanning Tree Based State Encoding for Low Power Dissipation"

Transcription

1 Sannin Tree Based State Encodin or Low Power Dissiation Winried Nöth and Reiner Kolla Lehrstuhl ür Technische Inormatik, Universität Würzbur, Würzbur, Germany Abstract In this aer we address the roblem o state encodin or synchronous inite state machines. The rimary oal is the reduction o switchin activity in the state reister. At the beinnin the state transition rah is transormed into an undirected rah where the edes are labeled with the state transition robabilities. Next a maximum sannin tree o the undirected rah is constructed, and we ormulate the state encodin roblem as an embeddin o the sannin tree into a Boolean hyercube o unknown dimension. At this oint a modiication o Prim s maximum sannin tree alorithm is resented to limit the dimension o the hyercube or area constraints. Then we roose a olynomial time embeddin heuristic, which removes the restriction o revious works, where the number o state bits used or encodino a k-state FSM was enerally limited to dlo 2 ke. Next a more sohisticated embeddin alorithm is resented, which takes into account the state transition robabilities not covered by the sannin tree. The resultin encodins o both alorithms oten exhibit a lower switchin activity and ower dissiation in comarison with a known heuristic or low ower state encodin. 1. Introduction The synthesis o circuits with reduced ower consumtion has rown more and more imortant over the last years. One drivin orce behind low ower circuit desin is the demand or loner battery lie o ortable comuters and telecommunication equiment. Another one results rom the excessive ower consumtion o hih erormance micro rocessors, which is currently the limitin actor in interation density o sinle- and multi-chi modules. This ower consumtion oten leads to reliability roblems due to overly hih oeratin temeratures. The rowin need or hih erormance comuters however can be exected to urther raise the imortance o ower related research in the uture. Research activity on low ower circuit desin is widesread and ranes rom voltae scalin and rocess otimization to hih level aroaches like instruction set desins and hardware/sotware codesin. This aer ocusses on minimizin the ower consumtion o synchronous inite state machines (FSMs), which orm an imortant art o many VLSI roducts. Since the circuit realization o a FSM is mostly determined by the state encodin, the encodin can be justly assumed to have a reat inluence on ower dissiation. Our rimary oal is the reduction o switchin activity in the state reister, but we will show that our encodins oten also lead to a reduced overall ower dissiation o the circuits enerated by SIS [10]. Research on FSM state encodin was irst tareted at minimization o circuit area and delay. For two level circuits De Micheli et al. devised alorithms or symbolic minimization and bit minimal state encodin [4], while Devadas et al. [5] develoed the MUSTANG state assinment system taretin multilevel networks. Power related research was irst aimed at recise comutation o switchin activity in sequential circuits [9][11]. Since then several low ower state encodin alorithms have been roosed. Tsui et al. [12] interated cost unctions or state reister and transition loic activity, while Benini et al. [1] develoed alorithms tradin o accuracy vs. comutational comlexity. Chen et al. [2] already ormulated the encodin roblem as a hyercube embeddin roblem. Common to these and other aroaches however is the limitation to a redetermined number o bits or the state encodin, which will be removed in this aer. We have just received notice that simultaneously to this work Molitor et al. [6] develoed a similar state encodin alorithm taretin the size o the BDD reresentation. The aer is oranized as ollows. Section 2 contains an examination o ower related issues in FSM synthesis. In section 3 we describe the connection o state encodin and hyercube embeddin and resent a modiication o Prim s alorithm or sannin tree comutation as well as two alorithms or sannin tree directed state encodin. Section 4 contains results and conclusions. 2. Power dissiation in FSMs FSMs are reresentations o sequential boolean unctions. They are conveniently described by a state transition rah (STG), where nodes reresent the states, and directed edes, labeled with inuts and oututs, describe the transition relation between states. When imlemented in hardware, FSMs

2 enerally are realized by an architecture shown in iure 1. Each state corresonds to a binary vector stored in the state reister. The combinational loic comutes the next state and outut unction based on the current state and inut values. The binary values o the inuts and oututs o a FSM are usually determined by external requirements, while the state encodin is let to the desiner. inuts combinational loic state reister Fi. 1: FSM hardware realization oututs In a sequential circuit o this tye, ower is dissiated in the state reister as well as in the combinational loic. This rimarily results rom chanin values o circuit sinals, where caacitances are chared or dischared (dynamic ower dissiation). The dynamic ower dissiation in the combinational art o the circuit is very diicult to estimate, even ater the state encodin is determined. At the beinnin there are already several dierent realizations to choose rom, deendin on what kind o technoloy will be used. Later, when the ate level imlementation is known, the exact comutation o the dynamic ower dissiation includin litches is oten intractable, since it requires the examination o all ossible airs o inut atterns o the combinational loic. Due to these diiculties the research in this aer ocusses on the minimization o the exected state reister switchin activity described below. This aroach still leads to a ood circuit in terms o ower consumtion, i a low switchin activity in the latch oututs corresonds to a low switchin activity in the combinational loic. The averae dynamic ower dissiation o the state reister P sb can be described by ollowin exression: P sb = 1 2 V 2 dd X i2sb C(i) E(i) where is the clock requency o the state machine, C(i) is the caacitance o the latch storin state bit i and E(i) is the exected switchin activity o the latch. Notice, that C(i) is not necessarily the same or all bits, since it includes the caacitance o the latch anout into the combinational art. Since this anout cannot be determined beore the state encodin is known, we simliy by assumin an overall state reister caacity C sr and introduce an exected reister switchin activity E sr : P sb 1 2 V 2 dd C sr E sr Let S be the set o all states. For an ininitely lon series o state transitions, E sr can be exressed by E sr = X i;j2s (i $ j) h(i; j) (1) where (i $ j) is the robability o a transition between states i and j, andh(i; j) is the hammin distance o the state codes o i and j. (i $ j) can be determined stochastically by assumin equirobability o all inut atterns o the FSM and solvin the Chaman Kolmoorov equations [3]. Alternatively they can be obtained statistically by alyin a suiciently lon series o inut atterns until the state occurrence and transition robabilities convere towards discrete values [9]. For the urose o minimizin (1), a FSM reresentation is suicient, which contains only the state to state transition robabilities. We will thereore transorm the initial STG by collasin all directed edes between any air o states into an undirected ede. The undirected edes are then weihted with their corresondin transition robability. Since the robabilities concerned are unconditional, the sum o all ede weihts includin sel loos equals one. From now on this undirected weihted rah will be reerred as the robability attraction rah (PAG, iure 2) st1 st st2 st Fi. 2: PAG o dk15 3. Hyercube embeddins A state encodin can always be ormulated as an embeddin o the STG or PAG into a (Boolean) hyercube. A hyercube o dimension n is a rah with 2 n nodes, where every node is labeled with an unique binary value rom 0 to 2 n, 1. Furthermore, every node v has n edes labeled 1 :::n, which lead to all nodes whose labels have hammin distance 1 rom v. Consequently, the hammin distance o any two nodes in the hyercube equals the lenth o the shortest ath between the nodes. An embeddin o a rah G into a host rah H is an injective main o the nodes o G to the nodes o H, so that every ede in G corresonds to the shortest ath between the mains o its terminal nodes in H. The dilation o an ede o G is deined as the

3 lenth o the corresondin ath in H. More detailed inormation on embeddin roblems can be ound in works on arallel comutin [8][13]. Since most roblems concernin embeddins o eneral rahs are NP comlete, we will only ive an inormal discussion on what could be a ood hyercube embeddin with resect to ower dissiation: (A) Reardin equation (1) it is desirable to embed with small dilation, since the dilation o an ede (v; w) corresonds directly to the hammin distance o the encodins o v and w, and the hammin distance determines the reister switchin activity or a iven state transition. The best obvious solution or our urose would be an embeddin with dilation 1 or all edes. Grahs with such an embeddin are called cubical. Unortunately it can be shown that there is no dilation-1 embeddin or many rahs (e.. rahs containin odd cycles). Furthermore, the roblem o indin an embeddin with minimum overall dilation is NP comlete or eneral rahs [13]. For most cubical rahs it is also diicult to determine their cubical dimension, which is the dimension o the smallest hyercube, where they can be embedded with dilation 1. (B) Reardin overall ower dissiation, it is also desirable to embed into a hyercube with low dimension, since the dimension o the hyercube corresonds to the number o bits o the state encodin, and unnecessary lare state reisters may increase ower consumtion. Area restrictions may even limit the number o state bits available or encodin. Without boundaries to dilation it is always ossible to embed a rah with k nodes into a hyercubeo dimension dlo 2 ke. Unortunately this will oten lead to a hih state reister switchin activity or many state transitions. While most research has concentrated on B with A as a side issue, we will try to ind a solution to A, with B as a secondary criterion. For that we have to embed G into a hyercube H, so that dilation o edes o G with hih weiht is minimized while the dimension o H is ket small. Obviously it is ineasible to otimally embed an arbitrary rah G(V;E), but the roblem can be simliied by embeddin a subrah G 0 (V;E 0 ), so that dilation > 1 occurs only on edes (v; w) with (v; w) 2 E and (v; w) 62 E 0.Thatis,i we construct a cubical subrah o G, which contains the edes with the hihest weihts, a dilation-1 embeddin o this subrah would intuitively lead to a low switchin activity in the state reister. Such a subrah is the maximum sannin tree o the PAG. SPANNING TREES Let G(V;E) be a weihted connected rah. A sannin tree o G is a subrah T (V;E 0 ) o G, sothatt is connected and #E 0 =#V,1.LetT be the set o all sannin trees o G. Amaximum sannin tree T max (V;E max ) o G is a sannin tree, so that 8 T (V;E 0 ) 2T: X (v;w)2emax W (v; w) X (v;w)2e 0 W (v; w) A maximum sannin tree can be constructed in time O(#E lo #V ) e.. by Prim s alorithm [7], and it is unique by construction, i no two edes o G have the same weiht. Furthermore, all trees are cubical, and while the exact determination o their cubical dimension cd is NP hard, some lower and uer bounds o cd are known. Let T (V;E) beatreeandletk be the maximum deree o any node v 2 V.Then max(dlo 2 #V e;k)cd(t ) #V, 1 Both lower and uer bounds o this inequation are attained by certain tyes o trees. A ath rah T P o lenth #V,1 e.. can be embedded by a Gray code with cd(t P )= dlo 2 #V e, while the star rah T S with k =#V,1or the center node has cd(t S )=k=#v,1. Since the dimension o the embeddin is stronly connected to the deree o nodes in the tree, we have modiied Prim s alorithm to accet a arameter d max limitin the deree o any node in the resultin sannin tree: modiied rim(rah G(V;E), int d max ) V T := one initial v init 2 V E T := ; cut := (v init ;w)2e do #V, 1 times (u; v) := select ede(cut, d max ) where u 2 V T ;v 2VnV T E T := E T [ (u; v) V T := V T [ v remove edes containin v rom cut cut := cut [(v; w) j w 2 V nv T return T (V T ;E T ) In the oriinal version, select ede simly selects the ede with the hihest weiht rom the cut. The new rocedure selects the hihest weihted ede (u; v), which does not increase the deree o the node u 2 V T above d max,i this is ossible. Subsequent tests with our embeddin alorithms showed, that or d max = lo 2 #V +1all benchmarks could be embedded into a hyercube o dimension 2 lo 2 #V or less with no siniicant enalty in switchin activity. The resultin sannin tree, which in most cases is a maximum sannin tree, roved to be a ood structure or directin a hyercube embeddin. TREE EMBEDDINGS For a iven tree T (V;E) our embeddins bein always at subsets o nodes and edes V C ;E C o T, which orm the center o the tree with resect to lonest aths. This is a direct way to construct Gray code embeddins with loarithmical dimensions or simle aths. Besides, or a well balanced tree the subtrees connected by the center o the tree can be embedded with about the same dimension, so that a

4 divide and conquer aroach should ind an embeddin o low overall dimension. V C and E C are deined as ollows: Let or = v 0 ;::: ;v k ath o T be () =kthe number o edes on. Then V C = v b k 2 c ;v d k 2 e is the set o nodes in the center o. We now deine the center o the tree as V C := [ :()=k maximum V C The center o the tree has the ollowin roerty: V C = \ :()=k maximum V C Proo: It is suicient to rove the exression or any air o lonest aths. Assume there are two lonest aths = v 0 :::v k and q = u 0 :::u k. The size o the ath centers exclusively deend on k,sothat: #V q C =#V C Assume urther, that there are nodes v i 2 V C and u j 2 V q C, with v i 62 V q C and u j 62 V C. Let c be the ath between v i and u j. Then there are subaths 0 ;q 0 o ; q o maximum lenth, which end in v i ;u j, so that ollowin equations hold: We will now show, that 0 \ q 0 = ; 0 \ c = v i q 0 \ c = u j ( 0 c q 0 )=( 0 )+(c)+(u 0 )>k (2) The equation on the let is true, since c has one node in common with each 0 and q 0. For the inequation on the riht there are two dierent cases to be examined: 1. \ q = ;: In this case ( 0 ) = (q 0 ) = d k e, because 2 the lonest subaths o ; q to a node in their ath centers contain at least hal o the edes o ; q. Since (c) 1, here (2) is valid. See iure 3 or illustration. q q vi c uj Fi \ q = V 0 6= ;: In this case c contains a node v 0 2 V 0, thereore (c) 2. Since at least one o the subaths rom a terminal node o ; q to v i ;u j does not contain nodes rom V 0, ( 0 ) = (q 0 ) = b k c, and (2) is valid aain. This is 2 illustrated in iure 4. q u j q v i v c Fi. 4 Exression (2) already imlies, that neither nor q are lonest aths, i they have dierent centers. E C is deined as the set o edes in the center o lonest aths. Here we have to distinuish between two cases or the lenth k o lonest aths: 1. k is even: We know rom our deinition above, that #V C =1. E C is now deined by E C := (v; w) j v 2 V C ^ 9 = v;w;::: ;u : 2. k is odd: Here #V C =2and consequently ()= k 2 E C := (v; w) j v 2 V C ^ w 2 V C ^ v 6= w V C and E C can be eiciently comuted by a sinle ass over the tree: Our alorithm iteratively removes the set o leas rom the tree, until #V 2. V C remains unchaned durin this oeration, since 1. no lea is in V C,i#V > 2,and 2. any lonest ath looses both terminal nodes. thereore the ath centers do not move. Ater the last iteration, V C consists o the nodes remainin in V,andE C is either the inal ede in E or the set o edes, which were removed last rom the tree: et tree center(t (V;E);E C ;V C ) V leas := v 2 V j deree(v) =1 E leas := ; while #V > 2 E leas := (v; w) 2 E jv; w\v leas 6= ; V := V nv leas E := EnE leas V leas := v 2 V j deree(v) =1 V C := V i #E >0 E C := E else E C := E leas

5 We will now resent olynomial time divide and conquer alorithms, which construct dilation 1 embeddins o trees into a hyercube by dividin the trees at the center deined above. FAST EMBEDDING ALGORITHM We have shown that the removal o an ede o E C breaks u a lonest ath at or near it s center, leavin two subtrees o unknown size and structure. Since both subtrees are to be embedded recursively, it would be best to balance the subtree embeddins with resect to dimension to minimize the dimension o the overall embeddin. It is however diicult to determine in advance, what dimension a subtree embeddin will have. Our irst alorithm thereore selects an ede (v; w) 2 E C, whose removal rom E leads to the most evenly sized subtrees T 0 and T 00 with resect to the number o edes o the subtrees. Then an index i 2 N corresondin to the ede label in the host hyercube is assined to (v; w), which means that the labels o the nodes connected by e dier exactly in osition i. Now (v; w) is removed rom the tree, slittin it u into two subtrees. The alorithm then recursively rocesses the subtrees T 0 and T 00 : embed tree ast(tree T (V;E), int i) et tree center(t;v C ;E C ) select ede (v; w) 2 E C connectin most balanced subtrees (v; w).idx := i remove (v; w) rom E et subtrees T 0 (V 0 ;E 0 );T 00 (V 00 ;E 00 ) i #E 0 > 0 embed tree ast(t 0, i +1) i #E 00 > 0 embed tree ast(t 00, i +1) The alorithm starts with embed tree ast(t;1) and it terminates, when all edes have indices assined. Overall runtime is o the order o O(#V 2 ) o the oriinal rah, since the rocedure is called once or every ede, while an eicient imlementation o et tree center runs in O(#V ). To derive an encodin rom the embedded tree a code is irst assined to one o the nodes. Then the codes o adjacent nodes are comuted by tolin the bit adressed by the index o the connectin ede. This rocedure is iterated, until all nodes are encoded. Since there are no cycles, the overall encodin is uniquely determined by the code o any node. By incrementin the index arameter i durin the recursion, the embeddin rocedure ensures, that or any deth the index o the ede (v; w) selected rom E C is not aain used in one o the subtrees connected by (v; w). This ensures, that any ath rom one subtree to another traverses at least one ede with an unique label i. Thereore all state codes o nodes in dierent subtrees dier at least in osition i. Since any air o nodes is somewhere in the recursion slitted u and assined to dierent subtrees, the encodin is injective. GREEDY EMBEDDING ALGORITHM The above alorithm is very ast, since it only embeds edes rom the sannin tree without reard to costs rom other edes in the PAG. Our second alorithm tries to take into account those edes o lower weiht, too. This however is only ossible between nodes, which are connected by a ath o already embedded edes in T. The new rocedure thereore always maintains a reion o encoded nodes Venc, which are connected by edes with known indices. Venc is initialized with a node v 2 V C o the center o the overall tree. Every time an index is assined to an ede (v; w), where one o the nodes, say v, is already encoded, the encoded reion is exanded by w and others, which are connected to w by reviously embedded edes: embed tree reedy(tree T (V;E), int i) et tree center(t;v C ;E C ) i Venc = ; v init := v 2 V C v init.code := 0 Venc := v init or all (v; w) 2 E C (v; w).idx := select index(t;venc;i) i:= i +1 remove (v; w) rom E exand reion(venc) or all T 0 (V 0 ;E 0 ) subtree o T i #E 0 > 0 embed tree reedy(t 0, i) There are two urther main dierences to the ast alorithm. First, the index to be assined to an ede is determined by a secial reedy rocedure select index, whichis described below. Second, all edes in E C are embedded within the actual call without selection. This usually leads to a aster rowth o the encoded reion in comarison with the revious alorithm. For the same reason the subtrees are rocessed in the inal loo, so that subtrees containin encoded nodes are embedded irst. This also immediately increases the encoded reion, the size o which determines the accuracy o the index selection, as ollows: For an ede (v; w) not connected to the encoded reion Venc select index simly returns the maximum index value, which corresonds to the ede index assined in the ast embeddin alorithm. I however (v; w) is connected to Venc, the node w 62 Venc can be encoded, and select index or all ossible indices i comutes the new code rom the code o v by tolin bit i. Then the switchin

6 costs between w and all other encoded nodes are determined rom the roduct o hammin distance and transition robability rom the PAG. I the actual i leads to a code that is already used or another node, cost is set to 1. Finally the index leadin to the lowest switchin costs amon the encoded nodes is selected: int select index(ede (v; w), node set Venc, int i max ) i v 62 Venc and w 62 Venc return i max nn assume v 2 Venc and w 62 Venc or all i 21;::: ;i max w.code := v.code toled in ith bit cost(i) := 0 or all u 2 Venc i u.code = w.code cost(i) :=1 i (u; w) 2 attraction rah cost(i) :=cost(i)+h(u; w) W (u; w) i cost(i) <cost(i min ) i min := i return i min The reedy alorithm is considerably slower than the ast one, since or every ede O(#V ) indices have to be tested, and or every index all codes rom the subset o encoded nodes may be examined. It is however still olynomial, and easible at least or medium sized roblems, since all benchmark embeddins were enerated within ew minutes. 4. Results We have run our ast and reedy encodin alorithms on a set o MCNC FSM examles in kiss2 ormat. As a reerence the O(#V #E) encodin alorithm ow3 resented by Benini [1] was selected, since it comutes a minimum lenth encodin taretin low state reister activity in a comarable small runtime. The results are summarized in table I. Columns 1 and 2 contain the circuit name and the number o states ater elimination o unreachable and unleavable states. The ollowin six columns in rous o three resent inormation about state reister size and exected reister activity or each o the alorithms tested. The inal three columns dislay the estimated ower consumtion in W o the circuit enerated by SIS ater extraction o sequential don t cares and otimization with scrit.rued [10]. The runtimes o the three encodin alorithms are not rinted, since bein in the order o seconds or minutes they were always dominated by the recedin Chaman Kolmoorov and the ollowin sequential otimization scrit. An asterisk is rinted where the otimization scrit did not terminate within several hours. As we can see, or 28 out o 44 examles the exected switchin activity E sr is reduced with resect to ow3 either by the ast alorithm or by the reedy alorithm, and it is increased by both in only three cases. Reduction varies rom 2% to 28% with an averae o about 13 ercent, while the state reister size is always ket at or below 2 lo 2 #V. Sometimes a reduction in switchin activity is achieved without a enalty in the size o the state reister. For the ower consumtion ater synthesis, as estimated by SIS, the results can be summarized as ollows. Out o 37 circuits, where SIS otimization terminated or all encodins, 26 o our best circuits are better in terms o ower consumtion than those encoded by ow3, while only six are worse. Here imrovement varies rom 1% u to 29% with an averae o about 17 ercent. It is also shown in table I, that or 26 out o 37 circuits imrovements were achieved either or both reister switchin activity and ower consumtion or or neither o them. This as well as many articular results conirm our assumtion, that reister switchin activity and ower consumtion are hihly correlated. Comarison o state reister size and ower consumtion however reveals no clear correlation. Sometimes circuits with larer state reister dissiate more ower, but there are also cases, where the overall ower dissiation is reduced desite a larer state reister and hiher switchin activity in the state reister. This robably comes rom larer sequential don t cares leadin to better otimization by SIS. This aer addressed the FSM state assinment roblem tareted towards low ower dissiation. The roblem was ormulated as a hyercube embeddin roblem, where the embeddin rocess is directed by a maximum sannin tree o the robability attraction rah o the FSM. We roosed a modiication o Prim s alorithm to limit the deree o the sannin tree and alon with it the dimension o the embeddin. Then two dierent state embeddin alorithms were resented, which in about two out o three cases roduced encodins with lower switchin activity and ower consumtion than a known heuristic o comarable comlexity. Due to the olynomial runtimes o our alorithms they are alicable to many lare FSMs, where the states can be exlicitly enumerated. It is also worth mentionin, that the roosed heuristics can be used or any state encodin roblem, where the costs can be described by an ede weiht unction o the STG. Reerences [1] L. Benini and G. DeMicheli: State Ass. or Low Power Diss. IEEE Journ. on Solid State Circ., 11(4): 32-40, March 1994 [2] Chen, Sarrazadeh, Yea: State Enc. o FSMs or Low Power Desin. To aear in VLSI Desin. [3] D.R. Cox and H.D. Miller: The Theory o Stochastic Processes. Chaman Hall, 1965 [4] DeMicheli, Brayton, Saniovanni: Otimal State Ass. or FSMs. IEEE Trans. on CAD, 4(3): , July 1985

7 circuit #V #bits E sr SIS ower (W ) ow3 ast reedy ow3 ast reedy ow3 ast reedy bbara bbsse bbtas beecount cse dk dk dk dk dk dk donile dvram ex ex ex ex ex ex etch keyb kirkman lion lion lo * mark mc nucwr ous lanet * * * ram test * * rie s * * 721 s sand * sc shitre sse styr * * * sync tav tbk * * 1121 train train [5] Devadas, Ma, Newton, Saniovanni: MUSTANG - State Ass. o FSMs Taretin Multilevel Loic Imlementations. IEEE Trans. on CAD, 12(11): , December 1988 [6] Forth, Molitor, Vot: State Encodin o FSMs Taret. BDD Reres. Priv. Comm. Univ. Halle, Germany, March 1998 [7] T. Lenauer: Combinatorial Alorithms or Interated Circuit Layout. Teubner Verla, 1990 [8] Livinston, Stout. Embeddins in Hyercubes. Mathematical and Comutational Modellin. 11: , 1988 [9] Najm, Goel, Hajj: Power Estimation in Sequential Circuits. Proc. o the 32th DAC, , Table I [10] Sentovich, Sinh, Brayton, Saniovanni: SIS - A System or Sequential Circuit Synth. Tech. Re., UC Berkeley, [11] Tsui, Pedram, Desain: Exact and Aroximate Methods or Calculatin Sinal and Transition Probabilities in FSMs. Proc. o the 31th DAC, 18-23, 1994 [12] Tsui, Pedram, Desain: Low Power State Assinment Taretin Two- and Multilevel Loic Imlementations. Proc. o the 31th DAC, 82-87, 1994 [13] Waner, Corneil: On the Comlexity o the Embeddin Problem or Hyercube Related Grahs. Discrete Alied Mathematics, 43:75-95, 1993

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions 17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach

More information

FFTs in Graphics and Vision. Rotational and Reflective Symmetry Detection

FFTs in Graphics and Vision. Rotational and Reflective Symmetry Detection FFTs in Grahics and Vision Rotational and Relectie Symmetry Detection Outline Reresentation Theory Symmetry Detection Rotational Symmetry Relectie Symmetry Reresentation Theory Recall: A rou is a set o

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

ANALYSIS OF ULTRA LOW CYCLE FATIGUE PROBLEMS WITH THE BARCELONA PLASTIC DAMAGE MODEL

ANALYSIS OF ULTRA LOW CYCLE FATIGUE PROBLEMS WITH THE BARCELONA PLASTIC DAMAGE MODEL XII International Conerence on Comutational Plasticity. Fundamentals and Alications COMPLAS XII E. Oñate, D.R.J. Owen, D. Peric and B. Suárez (Eds) ANALYSIS OF ULTRA LOW CYCLE FATIGUE PROBLEMS WITH THE

More information

A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL

A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL G. Theodoridis, S. Theoharis, D. Soudris*, C. Goutis VLSI Design Lab, Det. of Electrical and Comuter Eng.

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Cheng, N. S., and Law, A. W. K. (2003). Exponential formula for computing effective viscosity. Powder Technology. 129(1-3),

Cheng, N. S., and Law, A. W. K. (2003). Exponential formula for computing effective viscosity. Powder Technology. 129(1-3), THIS PAPER SHOULD BE CITED AS Cheng, N. S., and Law, A. W. K. (2003). Exonential ormula or comuting eective viscosity. Powder Technology. 129(1-3), 156 160. EXPONENTIAL FORMULA FOR COMPUTING EFFECTIVE

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Cmpt 250 Unsigned Numbers January 11, 2008

Cmpt 250 Unsigned Numbers January 11, 2008 Cmt 25 Unsined Numbers Januar, 28 These notes serve two uroses in the contet of Cmt 25: as we develo the basic desin of an inteer ALU, we ll review the basics of number reresentation and combinational

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Dirac s Hole Theory and the Pauli Principle: Clearing up the Confusion

Dirac s Hole Theory and the Pauli Principle: Clearing up the Confusion Adv. Studies Theor. Phys., Vol. 3, 29, no. 9, 323-332 Dirac s Hole Theory and the Pauli Princile: Clearing u the Conusion Dan Solomon Rauland-Borg Cororation 82 W. Central Road Mount Prosect, IL 656, USA

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

A BSS-BASED APPROACH FOR LOCALIZATION OF SIMULTANEOUS SPEAKERS IN REVERBERANT CONDITIONS

A BSS-BASED APPROACH FOR LOCALIZATION OF SIMULTANEOUS SPEAKERS IN REVERBERANT CONDITIONS A BSS-BASED AROACH FOR LOCALIZATION OF SIMULTANEOUS SEAKERS IN REVERBERANT CONDITIONS Hamid Reza Abutalebi,2, Hedieh Heli, Danil Korchagin 2, and Hervé Bourlard 2 Seech rocessing Research Lab (SRL), Elec.

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

DETERMINISTIC STOCHASTIC SUBSPACE IDENTIFICATION FOR BRIDGES

DETERMINISTIC STOCHASTIC SUBSPACE IDENTIFICATION FOR BRIDGES DEERMINISIC SOCHASIC SBSPACE IDENIFICAION FOR BRIDGES H. hai, V. DeBrunner, L. S. DeBrunner, J. P. Havlicek 2, K. Mish 3, K. Ford 2, A. Medda Deartment o Electrical and Comuter Engineering Florida State

More information

FULLY ADAPTIVE LMS/NLMS INTERPOLATED VOLTERRA FILTERS WITH REMOVED BOUNDARY EFFECT

FULLY ADAPTIVE LMS/NLMS INTERPOLATED VOLTERRA FILTERS WITH REMOVED BOUNDARY EFFECT 7th Euroean Sinal Processin Conference (EUSIPCO 9) Glasow, Scotland, Auust 4-8, 9 FULLY ADAPIVE LMS/NLMS INERPOLAED VOLERRA FILERS WIH REMOVED BOUNDARY EFFEC Eduardo L O Batista, Orlando J obias, and Rui

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Logic Design 2013/9/26. Introduction. Chapter 4: Optimized Implementation of Logic Functions. K-map

Logic Design 2013/9/26. Introduction. Chapter 4: Optimized Implementation of Logic Functions. K-map 2/9/26 Loic Desin Chapter 4: Optimized Implementation o Loic Functions Introduction The combinin property allows us to replace two minterms that dier in only one variable with a sinle product term that

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

Passive Identification is Non Stationary Objects With Closed Loop Control

Passive Identification is Non Stationary Objects With Closed Loop Control IOP Conerence Series: Materials Science and Engineering PAPER OPEN ACCESS Passive Identiication is Non Stationary Obects With Closed Loo Control To cite this article: Valeriy F Dyadik et al 2016 IOP Con.

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Time Frequency Aggregation Performance Optimization of Power Quality Disturbances Based on Generalized S Transform

Time Frequency Aggregation Performance Optimization of Power Quality Disturbances Based on Generalized S Transform Time Frequency Aggregation Perormance Otimization o Power Quality Disturbances Based on Generalized S Transorm Mengda Li Shanghai Dianji University, Shanghai 01306, China limd @ sdju.edu.cn Abstract In

More information

Dependence on Initial Conditions of Attainable Sets of Control Systems with p-integrable Controls

Dependence on Initial Conditions of Attainable Sets of Control Systems with p-integrable Controls Nonlinear Analysis: Modelling and Control, 2007, Vol. 12, No. 3, 293 306 Deendence on Initial Conditions o Attainable Sets o Control Systems with -Integrable Controls E. Akyar Anadolu University, Deartment

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

1 such that v k g. v g. u g

1 such that v k g. v g. u g Mesoscale Meteoroloy: Quasi-Geostrohic Theory 4, 6 February 7 Wait this is a mesoscale class why do we care about a tenet o synotic meteoroloy?? On the synotic-scale, scale analysis o the orcin terms in

More information

Simultaneous train rerouting and rescheduling on an N-track network: A model reformulation with network-based cumulative flow variables

Simultaneous train rerouting and rescheduling on an N-track network: A model reformulation with network-based cumulative flow variables Simultaneous train rerouting and rescheduling on an N-track network: A model reormulation with network-based cumulative low variables Lingyun Meng Assistant Proessor State Key Laboratory o Rail Traic Control

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

FLOW MEASUREMENT IN CLOSED CONDUIT

FLOW MEASUREMENT IN CLOSED CONDUIT FLOW MEASUREMENT IN CLOSED CONDUIT Closed conduit flow: It is a flow with boundaries and runs full. As in the case of oen channel flow, the surface is not exosed to atmoshere. Since it runs full it is

More information

DETERMINATION OF OPTIMAL HYDRO GENERATING UNIT COMBINATION IN OPERATION

DETERMINATION OF OPTIMAL HYDRO GENERATING UNIT COMBINATION IN OPERATION International Journal on Inmation Technoloies & Security,, 07 5 DETERMINTION OF OTIML HYDRO GENERTING UNIT COMINTION IN OERTION Sofija Nikolova-oceva, nton Chaushevski, Dimitar Dimitrov Faculty of Electrical

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

A Plane 1.88-Spanner for Points in Convex Position

A Plane 1.88-Spanner for Points in Convex Position A Plane 1.88-Sanner or Points in Convex Position Mahdi Amani Ahmad Biniaz Prosenjit Bose Jean-Lou De Caruel Anil Maheshwari Michiel Smid October 6, 016 Abstract Let S be a set o n oints in the lane that

More information

THE IMPACT OF ELEVATED MASTS ON LIGHTNING INCIDENCE AT THE RADIO-BASE-STATION VICINITIES

THE IMPACT OF ELEVATED MASTS ON LIGHTNING INCIDENCE AT THE RADIO-BASE-STATION VICINITIES X International Symosium on Lihtnin Protection 9 th -13 th November, 9 Curitiba, Brazil THE IMPACT OF ELEVATED MASTS ON LIGHTNING INCIDENCE AT THE RADIO-BASE-STATION VICINITIES Rosilene Nietzsch Dias 1,

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Improving Patent Examination Efficiency and Quality: An Operations Research Analysis of the USPTO, Using Queuing Theory.

Improving Patent Examination Efficiency and Quality: An Operations Research Analysis of the USPTO, Using Queuing Theory. Imroving Patent Examination Eiciency and Quality: An Oerations Research Analysis o the USPTO, Using Queuing Theory By Ayal Sharon and Yian Liu Aendices APPENDIX I FOUNDATIONAL FORMULAS. Formula or Mean

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

EE 457 HW 2 Arithmetic Designs Redekopp Puvvada Name: Due: See Website

EE 457 HW 2 Arithmetic Designs Redekopp Puvvada Name: Due: See Website EE 457 HW 2 rithmetic Desins Redeko uvvada Name: Due: ee Website core: lease ost any questions reardin HW roblems on iazza. Refer to your class notes Unit on Fast ddition. In this class we will count the

More information

Comptes rendus de l Academie bulgare des Sciences, Tome 59, 4, 2006, p POSITIVE DEFINITE RANDOM MATRICES. Evelina Veleva

Comptes rendus de l Academie bulgare des Sciences, Tome 59, 4, 2006, p POSITIVE DEFINITE RANDOM MATRICES. Evelina Veleva Comtes rendus de l Academie bulgare des ciences Tome 59 4 6 353 36 POITIVE DEFINITE RANDOM MATRICE Evelina Veleva Abstract: The aer begins with necessary and suicient conditions or ositive deiniteness

More information

Categorical Background (Lecture 2)

Categorical Background (Lecture 2) Cateorical Backround (Lecture 2) February 2, 2011 In the last lecture, we stated the main theorem o simply-connected surery (at least or maniolds o dimension 4m), which hihlihts the importance o the sinature

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Primary Author: James D. McCalley, Iowa State University

Primary Author: James D. McCalley, Iowa State University Module T7: The ower Flow roblem 7 Module T7 The ower Flow roblem rimary Author: ames D. McCalley, Iowa State University Email Address: dm@iastate.edu Co-author: one rereuisite Cometencies:. Steady State

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results (C) The rationals and the reals as linearly ordered sets We know that both Q and R are something special. When we think about about either o these we usually view it as a ield, or at least some kind o

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Towards Realistic Modeling of Time-Table Information through the Time-Dependent Approach

Towards Realistic Modeling of Time-Table Information through the Time-Dependent Approach Electronic Notes in Theoretical Comuter Science 9 (4) 85 3 www.elsevier.com/locate/entcs Towards Realistic Modeling o Time-Table Inormation through the Time-Deendent roach Evangelia Pyrga a,, Frank Schulz

More information

Node-voltage method using virtual current sources technique for special cases

Node-voltage method using virtual current sources technique for special cases Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological

More information

Mixture Behavior, Stability, and Azeotropy

Mixture Behavior, Stability, and Azeotropy 7 Mixture Behavior, Stability, and Azeotropy Copyrihted Material CRC Press/Taylor & Francis 6 BASIC RELATIONS As compounds mix to some deree in the liquid phase, the Gibbs enery o the system decreases

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

Proof Nets and Boolean Circuits

Proof Nets and Boolean Circuits Proof Nets and Boolean Circuits Kazushige Terui terui@nii.ac.j National Institute of Informatics, Tokyo 14/07/04, Turku.1/44 Motivation (1) Proofs-as-Programs (Curry-Howard) corresondence: Proofs = Programs

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

EXPERIMENTAL STRATEGY FOR THE DETERMINATION OF HEAT TRANSFER COEFFICIENTS IN PEBBLE-BEDS COOLED BY FLUORIDE SALTS

EXPERIMENTAL STRATEGY FOR THE DETERMINATION OF HEAT TRANSFER COEFFICIENTS IN PEBBLE-BEDS COOLED BY FLUORIDE SALTS EXPERIMENTAL STRATEGY FOR THE DETERMINATION OF HEAT TRANSFER COEFFICIENTS IN PEBBLE-BEDS COOLED BY FLUORIDE SALTS L. Huddar, P. F. Peterson Deartment o Nuclear Engineering, University o Caliornia, Berkeley,

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender

More information

Simpler Functions for Decompositions

Simpler Functions for Decompositions Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

Synthesis of Moore FSM with Expanded Coding Space

Synthesis of Moore FSM with Expanded Coding Space Volume 3 Issue, January 24 Synthesis of oore FS with Exanded Coding Sace Olena Hebda, Larysa Titarenko Institute of Comuter Engineering and Electronics University of Zielona Góra Zielona Góra, Poland Email:

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

A note on the preferred hedge instrument

A note on the preferred hedge instrument ingnan University Digital Commons @ ingnan University ong ong Institute o Business tudies Working aer eries ong ong Institute o Business tudies 香港商學研究所 6-5 A note on the reerred hedge instrument Arthur

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

Advances in Derivative-Free State. Niels K. Poulsen? 2800 Lyngby, Denmark. Abstract

Advances in Derivative-Free State. Niels K. Poulsen? 2800 Lyngby, Denmark. Abstract Advances in Derivative-Free State Estimation or Nonlinear Systems Magnus N rgaard?} mn@iau.dtu.dk Niels K. Poulsen? nk@imm.dtu.dk Ole Ravn } or@iau.dtu.dk? Deartment o Mathematical Modelling } Deartment

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

GAS-SOLID FLOW MODEL FOR MEDIUM CALIBER NAVAL GUN

GAS-SOLID FLOW MODEL FOR MEDIUM CALIBER NAVAL GUN GAS-SOLID FLOW MODEL FOR MEDIUM CALIBER NAVAL GUN HAZEM EL SADEK School of Enery and Power Enineerin Nanjin University of Science and Technoloy, Nanjin CHINA XIAOBING ZHANG School of Enery and Power Enineerin

More information

Available online at ScienceDirect. Procedia Engineering 102 (2015 )

Available online at   ScienceDirect. Procedia Engineering 102 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 102 (2015 ) 1366 1372 The 7th World Congress on Particle Technology (WCPT7) Numerical Modelling o ESP or Design Otimization

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

Synthesis of Reversible Circuits Using Decision Diagrams

Synthesis of Reversible Circuits Using Decision Diagrams Synthesis o Reversible Circuits Usin Decision Diarams Rol Drechsler Robert Wille Institute o Computer Science, University o Bremen, 28359 Bremen, Germany Cyber-Physical Systems, DFKI GmbH, 28359 Bremen,

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Problem set 6 for Quantum Field Theory course

Problem set 6 for Quantum Field Theory course Problem set 6 or Quantum Field Theory course 2018.03.13. Toics covered Scattering cross-section and decay rate Yukawa theory and Yukawa otential Scattering in external electromagnetic ield, Rutherord ormula

More information

PMD monitoring in traffic-carrying optical systems and its statistical analysis

PMD monitoring in traffic-carrying optical systems and its statistical analysis PMD monitoring in traic-carrying otical systems and its statistical analysis Juneng Jiang 1,, Sathyanarayanan Sundhararajan 1, Doug Richards, Steve Oliva and Rongqing Hui 1,* 1 Electrical Engineering &

More information

Round-off Errors and Computer Arithmetic - (1.2)

Round-off Errors and Computer Arithmetic - (1.2) Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Multilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale

Multilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale World Alied Sciences Journal 5 (5): 546-552, 2008 ISSN 1818-4952 IDOSI Publications, 2008 Multilayer Percetron Neural Network (MLPs) For Analyzing the Proerties of Jordan Oil Shale 1 Jamal M. Nazzal, 2

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

A SIMPLE AD EFFICIET PARALLEL FFT ALGORITHM USIG THE BSP MODEL MARCIA A. IDA AD ROB H. BISSELIG Abstract. In this aer, we resent a new arallel radix-4

A SIMPLE AD EFFICIET PARALLEL FFT ALGORITHM USIG THE BSP MODEL MARCIA A. IDA AD ROB H. BISSELIG Abstract. In this aer, we resent a new arallel radix-4 Universiteit-Utrecht * Deartment of Mathematics A simle and ecient arallel FFT algorithm using the BSP model by Marcia A. Inda and Rob H. Bisseling Prerint nr. 3 March 2000 A SIMPLE AD EFFICIET PARALLEL

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

Evaluation of Different Modelling Methods Used for Erosion Prediction

Evaluation of Different Modelling Methods Used for Erosion Prediction Paer No. 11005 Evaluation o Dierent Modelling Methods Used or Erosion Prediction MYSARA EISSA MOHYALDIN 1, NOAMAN ELKHATIB 2, MOKHTAR CHE ISMAIL 3 1 College o Petroleum Eng. And Tech. Sudan University

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information