Bus transit = 20 ns (one way) access, each module cannot be accessed faster than 120 ns. So, the maximum bandwidth is
|
|
- Cory Hudson
- 5 years ago
- Views:
Transcription
1 32 Flynn: Coputer Architecture { The Solutions Chapter 6. Meory Syste Design Proble 6. The eory odule uses 64 4 M b chips for 32MB of data and 8 4 M b chips for ECC. This allows 64 bits + 8 bits ECC to be accessed in parallel, foring a physical word. T access =odule = 20 ns T c = 20 ns T nibble = 40 ns up to four accesses Physical word = 64 bits + 8 bits ECC Bus transit = 20 ns (one way) ECC = 40 ns a. Meory syste access tie b. Maxiu eory data bandwidth = Bus transit + T access =odule + T ECC + Bus transit = = 200 ns Since we are allowed to have ultiple buses and ECC units, we think of 4 eory odules as one very wide eory with 256 bits (64 bits 4) wide datapath. That is, 256 bits can be fetched in parallel. The only liiting factor here is T c for each odule. For rando access, each odule cannot be accessed faster than 20 ns. So, the axiu bandwidth is 256 bits 20ns = Bps = 254M Bps. c. Fro above, 256 bits can be fetched in parallel. We can use nibble ode for 4 consecutive accesses. Thus we can fetch = 024 bits every 20 + (4 ) 40 = 240 ns. So the axiu bandwidth is = Bps = 509MBps. 024 bits 240ns The low-order bits of the address are divided up as follows: bits 0{2: bits 3{4: bits 5{6: byte oset odule address nibble address Proble 6.2 a. For a page ode, the best organization will place a single page on a single odule; this takes advantage of locality of reference as consecutive references to a single (2K) page will be able to take advantage of page ode. This is better than nibble ode, where only references to the sae four words can take advantage of the optiized T nibble tie. Thus, the lower bits of the word address are used as a (DRAM) page oset, and the address is broken up as follows: bits 0{2: byte oset bits 3{3: page oset bits 4{5: odule address The advantage to interleaving is that accesses to dierent pages can be overlapped.
2 Proble b. This syste will perfor signicantly better than nibble ode for:. Non-sequential access patterns. 2. Access patterns that exhibit locality within a DRAM page. 3. Access patterns that exhibit locality within ultiple pages. 4. Access patterns that sequentially traverse pages. Proble 6.3 Haing Code Design Data size () = 8 bits 2 k + k + Solve for k, and get k = 5 Total essage length = = 23 bits Each correction bit covers its group bits () k :, 3, 5, 7, 9,, 3, 5, 7, 9, 2, 23 k 2 : 2{3, 6{7, 0{, 4{5, 8{9, 22{23 k 3 : 4{7, 2{5, 20{23 k 4 : 8{5 k 5 : 6{23. Code for SEC (single error correction): f f f f f f f f f f f f f f f f f f f f f f f k k k k k The logic equation for each k is just XOR of each k's group bits. 2. Code for DEC (double error correction): To detect double bit errors, we ust add a nal parity bit for the entire SEC code. f f f f f f f f f f f f f f f f f f f f f f f f k k k k k k Proble MIPS 0.9 Instruction refs/inst 0.3 Data read/inst and 0. Data write/inst T a = 200 ns T c = 00 ns
3 34 Flynn: Coputer Architecture { The Solutions Use open queue odel a. The allocation of odules to instruction and data i) Meory odules for instruction MAPS for instruction = 0:9 40 = 36 MAPS = s = T c = = = 3:6= Use = 8, = :45 So, 8 odules are necessary. ii) Meory odules for data MAPS for data = :4 40 = 6 MAPS = = :6 Use = 4, = :4 So, 4 odules are necessary. 2 odules are necessary in total. b. Eective T w per reference (overall) Assue this is M B =D= p = T w = p 2( ) = T c 2( ) For instruction eory, T w = :45 :25 = 29:55 ns 2( :45) For data eory, T w = 00 0 Overall T w = :929:55ns+:42:5ns :4+:9 = 24:3 ns c. Queue size 9 :4 :25 = 2:5 ns 2( :4) For instruction eory, Q ot = T w for Inst = : = :06 For data eory, Q ot = T w for data = :5 0 9 = :2 Overall Q ot = :06 + :2 = :26 d. Coparison to a single integrated I and D eory syste MAPS = :3 40 MIPS = 52 MAPS = s T c = = 5:2 Use = 6, =.325 T w = T c = 00 ns : ( ) 2( :325) = 9:4 ns Q ot = T w = 9:4 ns per sec = :009 Type Nuber of odules T w Q ot Split ns.26 Integrated ns
4 Proble Proble 6.5 Use M B =D= closed queue odel for realistic results T c = 00 ns; T a = 20 ns Two references to eory in each eory cycle: n = 2 Eight interleaved eory odules: = 8 a. Expected waiting tie a = q ( ) = :233 T w = T a c 2( a) = 00 ns :233 8 b. Total access tie 2( :233) = 7:04 ns T a + T w = 20 ns + 7:04 ns = 27:04ns c. Mean total nuber of queued (waiting) requests n B = n a = 2 8 :233 = :36 d. Oered eory bandwidth Oered = n=t c = 2=00 ns = 20 MAPS e. Achieved eory bandwidth B(; n)=t c = 8 :233=00ns = 8:64 MAPS f. Achieved bandwidth using Strecker's odel B(; n) = ( ( ) n ) = 8( ( 8 )2 ) = :875 Bandwidth = B T c = : = 8:75 MAPS Proble 6.7 Integrated Meory with = 8 C P = 2 (Instruction source and data source; assues no independent writes fro a data buer. If data buer is assued, then C p = 3.) Z = C P T Tc = 3 00( ns) = 2 =(400 6 ) = Z n = :3 00( ns) = :433 2 =(400 6 ) Perf ach = 3:74 5:2 B(; n; ) = + n 2 :433 = 8 + 5:2 2 = 3:74 40 MIPS = 28:8 MIPS. q q ( + n 2 )2 2n :433 (8 + 5:2 2 )2 2 5:2 8
5 36 Flynn: Coputer Architecture { The Solutions Proble 6.8 T a = 200 ns, T c = 00 ns, = 8, T bus = 25 ns, L = 6; Copyback with write allocate. a. Copute T line:access. L > and T c < T bus b. Repeat for = 2 and = 4. = 2; < L and T c > T bus = 4; < L and T c T bus T line:access = T a + (L ) T bus = = 575 ns T line:access = T a + T c (d L e) + T bus ((L )od ) = (7) + 25() = 925 ns T line:access = T a + (L )T bus = (25) = 575 ns c. Nibble ode is now introduced: T nibble = 50 ns; = 2; v = 4; T v = 50 ns T line:access = T a + T c (d v L e ) + T bus(l = () + 25(6 2) = 650 ns L v ) Proble 6.9 CBWA with w = :5, T a = 200 ns, T c = 00 ns, = 8, T bus = 25 ns, L = 6 a. Unbuered line transfer starting at line address T :iss = ( + w) T line:access = :5 575 ns = 863 ns T c:iss = ( + w) T line:access = :5 575 ns = 863 ns T busy = 0 ns b. Write buer, line transfer starting at line address T :iss = ( + w) T line:access = :5 575 ns = 863 ns T c:iss = T line:access = 575 ns T busy = w T line:access = 288 ns c. Access rst word T :iss = ( + w) T line:access = :5 575 ns = 863 ns T c:iss = T a = 200 ns T busy = T :iss T c:iss = 663 ns
6 Proble Proble 6.3 A processor without a cache accesses every t-th eleent of a k eleent vector. Each eleent is physical word. Assuing T a = 200 ns, T c = 00 ns, and T bus = 25 ns, plot the average access tie per eleent for an 8-way, low-order interleaved eory for t = to 2 and k = 00. Figure 2: Proble 6-3. Proble 6.4 s = 75 MAPS and T s = 00 ns = s T s = = 7:5 Since should be around.5, use = 6. Then, = 7:5 6 =.469. Q o = ( p) = :469(:469 6 ) 2( ) 2( :469) = :795 Q ot = 6 :795 = 2:87 a. Using Chebyshev Prob (q > BF).0 Prob (q BF +).0 Q o BF +.0 BF + Qo P = :795 = 7:95 8 :0 BF 7 Total BF (TBF) = 7 6 = 272
7 38 Flynn: Coputer Architecture { The Solutions b. Using M/M/ Prob (overow).0 Solve for (TBF=)+2 = :0 :469 (TBF=)+2 = :0 TBF 66 Proble 6.5 You are to design the eory for a 50 MIPS processor ( ~ /I) with instruction and 0.5 data references per instruction. The eory syste is to be 6MB. The physical word size is 4B. You are to use M x b chips with T c = 40 ns. Draw a block diagra of your eory including address, data, and control connections between the processor, DRAM controller, and the eory. Detail what each address bit does. If T a = 00 ns, what are the expected eory occupancy, waiting tie, total access tie, and total queue size? Discuss the applicability of the Flores odel in the analysis of this design? A3,A2 CS CPU Addr 24 DRAM Ctrl RAS/CAS Addr 0 CS CS CS Meory Chips (32) Data 32 Figure 3: Proble 6-5. = 75MAP S = =T c = = = 3= = 4 = 0:75 = T w = T c 2( ) = T c = 40 ns ( =) Q o = = 0:75 2( ) Q o t = 3 Because of the high occupancy of the eory, the Flores odel is not particularly well suited to this design.
8 Proble Proble 6.7 IF/cycle =.5 DF/cycle =.3 DS/cycle =.3 = 8 and T s = 00 ns(eory) Processor cycle tie (T ) = 20 ns! 50 MIPS = : = 45 MAPS n = (:5 + :3 + :) = 4:5 z = = 5 = n z = 4:5 5 =.3 = n = 4:5 8 =.563 B(; n; ) = 8 + 4:5 :3 2 r (8 + 4:5 = 3:377 Bw = 3: = 33:77MAP S :3 2 ) :5 a = B = 3:377 = :422 8 MIPS ach = a : MIPS = = 37:48 MIPS :563 T w = n B B T 4:5 3:377 s = 00( ns) = 33:25(ns) 3:377 Q ct = n B = 4:5 3:377 = :23 Proble 6.8 a. Line size = 6B This is already calculated in study 6.3. Perf rel = :78 b. Line size = 8B Miss rate =.07 L = 8B=4B = 2 L T line access = T a + T c ( ) + T bus ((L ) od ) = ( ) + 40((2 ) od 2) = = 60 ns T :iss = ( + w)t line access = :5 60 ns = 240 ns Perf rel = + f p T :iss = + : = :704
9 40 Flynn: Coputer Architecture { The Solutions c. Line size = 32B Miss rate =.02 L = 32B 4B = 8 8 T line access = ( 2 = 460 ) + 40((8 ) od 2) T :iss = ( + w) 460 ns = :5 460 ns = 690 ns Perf rel = + :02 =( ) = :743 9 In conclusion, the cache with 6B line size shows the best perforance.
Parallel stream cipher for secure high-speed communications
Signal Processing 82 (2002 259 265 www.elsevier.co/locate/sigpro Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University,
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More informationFinite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields
Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for
More informationNCU EE -- DSP VLSI Design. Tsung-Han Tsai 1
NCU EE -- DSP VLSI Design. Tsung-Han Tsai 1 Multi-processor vs. Multi-computer architecture µp vs. DSP RISC vs. DSP RISC Reduced-instruction-set Register-to-register operation Higher throughput by using
More informationStudy on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning
Int. Journal of Math. Analysis, Vol. 7, 2013, no. 40, 1949-1960 HIKARI Ltd, www.-hikari.co http://dx.doi.org/10.12988/ia.2013.36142 Study on Markov Alternative Renewal Reward Process for VLSI Cell Partitioning
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationBirthday Paradox Calculations and Approximation
Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationAs a model for an ATM switch we consider the overow frequency of a queue that
BUFFER OVERFLOW ASYMPTOTICS FOR A BUFFER HANDLING MANY TRAFFIC SOURCES COSTAS COURCOUBETIS, University of Crete RICHARD WEBER, University of Cabridge Abstract As a odel for an ATM switch we consider the
More informationMassachusetts Institute of Technology Quantum Mechanics I (8.04) Spring 2005 Solutions to Problem Set 4
Massachusetts Institute of Technology Quantu Mechanics I (8.04) Spring 2005 Solutions to Proble Set 4 By Kit Matan 1. X-ray production. (5 points) Calculate the short-wavelength liit for X-rays produced
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationSimulation of Discrete Event Systems
Siulation of Discrete Event Systes Unit 9 Queueing Models Fall Winter 207/208 Prof. Dr.-Ing. Dipl.-Wirt.-Ing. Sven Tackenberg Benedikt Andrew Latos M.Sc.RWTH Chair and Institute of Industrial Engineering
More informationarxiv: v3 [cs.ds] 22 Mar 2016
A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn
More informationDefect-Aware SOC Test Scheduling
Defect-Aware SOC Test Scheduling Erik Larsson +, Julien Pouget*, and Zebo Peng + Ebedded Systes Laboratory + LIRMM* Departent of Coputer Science Montpellier 2 University Linköpings universitet CNRS Sweden
More informationIDAN Shock Mount Isolation Vibration Study November 1, The operation of shock and vibration isolation base plate
dr. Istvan Koller RTD USA BME Laboratory. Background In 998, Real Tie Devices USA, Inc. introduced a novel packaging concept for ebedded PC/04 odules to build Intelligent Data Acquisition Nodes. This syste,
More informationIntroduction to Discrete Optimization
Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and
More informationELEMENTARY MARKOV QUEUEING SYSTEMS WITH UNRELIABLE SERVER
Nuber 4. Volue IV. Deceber 2009 EMENTARY MARKOV QUEUEING SYSTEMS WITH UNRIABLE SERVER Michal Dorda Suary:This paper presents soe exaples of eleentary Marov unreliable queueing systes and their atheatical
More informationArithmetic Unit for Complex Number Processing
Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationLow complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials
Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI
More informationICS 233 Computer Architecture & Assembly Language
ICS 233 Computer Architecture & Assembly Language Assignment 6 Solution 1. Identify all of the RAW data dependencies in the following code. Which dependencies are data hazards that will be resolved by
More informationAnalyzing Simulation Results
Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient
More informationStability Analysis of the Matrix-Free Linearly Implicit 2 Euler Method 3 UNCORRECTED PROOF
1 Stability Analysis of the Matrix-Free Linearly Iplicit 2 Euler Method 3 Adrian Sandu 1 andaikst-cyr 2 4 1 Coputational Science Laboratory, Departent of Coputer Science, Virginia 5 Polytechnic Institute,
More informationZISC Neural Network Base Indicator for Classification Complexity Estimation
ZISC Neural Network Base Indicator for Classification Coplexity Estiation Ivan Budnyk, Abdennasser Сhebira and Kurosh Madani Iages, Signals and Intelligent Systes Laboratory (LISSI / EA 3956) PARIS XII
More informationPattern History Table. Global History Register. Pattern History Table. Branch History Pattern Pattern History Bits
An Enhanced Two-Level Adaptive Multiple Branch Prediction for Superscalar Processors Jong-bok Lee, Soo-Mook Moon and Wonyong Sung fjblee@mpeg,smoon@altair,wysung@dspg.snu.ac.kr School of Electrical Engineering,
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationOn Concurrent Detection of Errors in Polynomial Basis Multiplication
1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses
More informationFPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)
More informationACCUMULATION OF FLUID FLOW ENERGY BY VIBRATIONS EXCITATION IN SYSTEM WITH TWO DEGREE OF FREEDOM
ENGINEERING FOR RURAL DEVELOPMENT Jelgava, 9.-.5.8. ACCUMULATION OF FLUID FLOW ENERGY BY VIBRATION EXCITATION IN YTEM WITH TWO DEGREE OF FREEDOM Maris Eiduks, Janis Viba, Lauris tals Riga Technical University,
More information2. A crack which is oblique (Swedish sned ) with respect to the xy coordinate system is to be analysed. TMHL
(Del I, teori; 1 p.) 1. In fracture echanics, the concept of energy release rate is iportant. Fro the fundaental energy balance of a case with possible crack growth, one usually derives the equation where
More informationProject Two RISC Processor Implementation ECE 485
Project Two RISC Processor Implementation ECE 485 Chenqi Bao Peter Chinetti November 6, 2013 Instructor: Professor Borkar 1 Statement of Problem This project requires the design and test of a RISC processor
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationReversibility of Turing Machine Computations
Reversiility of Turing Machine Coputations Zvi M. Kede NYU CS Technical Report TR-2013-956 May 13, 2013 Astract Since Bennett s 1973 seinal paper, there has een a growing interest in general-purpose, reversile
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationLow-complexity, Low-memory EMS algorithm for non-binary LDPC codes
Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering
More information26 Impulse and Momentum
6 Ipulse and Moentu First, a Few More Words on Work and Energy, for Coparison Purposes Iagine a gigantic air hockey table with a whole bunch of pucks of various asses, none of which experiences any friction
More informationNBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University
NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationLinear Transformations
Linear Transforations Hopfield Network Questions Initial Condition Recurrent Layer p S x W S x S b n(t + ) a(t + ) S x S x D a(t) S x S S x S a(0) p a(t + ) satlins (Wa(t) + b) The network output is repeatedly
More informationARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA
S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of
More informationDRAM Reliability: Parity, ECC, Chipkill, Scrubbing. Alpha Particle or Cosmic Ray. electron-hole pairs. silicon. DRAM Memory System: Lecture 13
slide 1 DRAM Reliability: Parity, ECC, Chipkill, Scrubbing Alpha Particle or Cosmic Ray electron-hole pairs silicon Alpha Particles: Radioactive impurity in package material slide 2 - Soft errors were
More informationConstant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool
Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University
More informationShort Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationLocal Maximum Ozone Concentration Prediction Using LSTM Recurrent Neural Networks
Local Maxiu Ozone Concentration Prediction Using LSTM Recurrent Neural Networks Sabrine Ribeiro René Alquézar Dept. Llenguatges i Sistees Inforàtics Universitat Politècnica de Catalunya Capus Nord, Mòdul
More informationE. Alpaydın AERFAISS
E. Alpaydın AERFAISS 00 Introduction Questions: Is the error rate of y classifier less than %? Is k-nn ore accurate than MLP? Does having PCA before iprove accuracy? Which kernel leads to highest accuracy
More informationECS455: Chapter 5 OFDM
ECS455: Chapter 5 OFDM 5.4 Cyclic Prefix (CP) 1 Dr.Prapun Suksopong prapun.co/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Friday 14:00-16:00 Three steps towards odern OFDM 1. Mitigate Multipath
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationIdentical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter
Identical Maxiu Lielihood State Estiation Based on Increental Finite Mixture Model in PHD Filter Gang Wu Eail: xjtuwugang@gail.co Jing Liu Eail: elelj20080730@ail.xjtu.edu.cn Chongzhao Han Eail: czhan@ail.xjtu.edu.cn
More informationNow multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get:
Equal Area Criterion.0 Developent of equal area criterion As in previous notes, all powers are in per-unit. I want to show you the equal area criterion a little differently than the book does it. Let s
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationAn improved self-adaptive harmony search algorithm for joint replenishment problems
An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,
More informationMicroprocessor Power Analysis by Labeled Simulation
Microprocessor Power Analysis by Labeled Simulation Cheng-Ta Hsieh, Kevin Chen and Massoud Pedram University of Southern California Dept. of EE-Systems Los Angeles CA 989 Outline! Introduction! Problem
More informationImpact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ
More informationKernel Methods and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic
More informationA method to determine relative stroke detection efficiencies from multiplicity distributions
A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,
More informationProbability and Stochastic Processes: A Friendly Introduction for Electrical and Computer Engineers Roy D. Yates and David J.
Probability and Stochastic Processes: A Friendly Introduction for Electrical and oputer Engineers Roy D. Yates and David J. Goodan Proble Solutions : Yates and Goodan,1..3 1.3.1 1.4.6 1.4.7 1.4.8 1..6
More informationSequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,
Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:
More informationComparing coordination models and architectures using embeddings
Science of Coputer Prograing 46 (2003) 31 69 www.elsevier.co/locate/scico Coparing coordination odels and architectures using ebeddings Marcello M. Bonsangue a, Joost N. Kok b, Gianluigi Zavattaro c; a
More informationContent Caching and Delivery in Wireless Radio Access Networks
Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated
More informationConfirming the Design Gap
Confiring the Design Gap Benjain Menhorn and Frank Sloka Institute for Ebedded Systes/Real-Tie Systes Ul University Albert-Einstein-Allee 11, Ul, Gerany benjain.enhorn frank.sloka@uni-ul.de Abstract. The
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationALU A functional unit
ALU A functional unit that performs arithmetic operations such as ADD, SUB, MPY logical operations such as AND, OR, XOR, NOT on given data types: 8-,16-,32-, or 64-bit values A n-1 A n-2... A 1 A 0 B n-1
More informations = (Y Q Y P)/(X Q - X P)
Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The
More informationI. Understand get a conceptual grasp of the problem
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Departent o Physics Physics 81T Fall Ter 4 Class Proble 1: Solution Proble 1 A car is driving at a constant but unknown velocity,, on a straightaway A otorcycle is
More informationElastic Force: A Force Balance: Elastic & Gravitational Force: Force Example: Determining Spring Constant. Some Other Forces
Energy Balance, Units & Proble Solving: Mechanical Energy Balance ABET Course Outcoes: 1. solve and docuent the solution of probles involving eleents or configurations not previously encountered (e) (e.g.
More informationPULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE
PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.
More informationEffective joint probabilistic data association using maximum a posteriori estimates of target states
Effective joint probabilistic data association using axiu a posteriori estiates of target states 1 Viji Paul Panakkal, 2 Rajbabu Velurugan 1 Central Research Laboratory, Bharat Electronics Ltd., Bangalore,
More informationMidterm 1 Sample Solution
Midter 1 Saple Solution NOTE: Throughout the exa a siple graph is an undirected, unweighted graph with no ultiple edges (i.e., no exact repeats of the sae edge) and no self-loops (i.e., no edges fro a
More informationHandwriting Detection Model Based on Four-Dimensional Vector Space Model
Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector
More informationANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER
IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel
More informationBEF BEF Chapter 2. Outline BASIC PRINCIPLES 09/10/2013. Introduction. Phasor Representation. Complex Power Triangle.
BEF 5503 BEF 5503 Chapter BASC PRNCPLES Outline 1 3 4 5 6 7 8 9 ntroduction Phasor Representation Coplex Power Triangle Power Factor Coplex Power in AC Single Phase Circuits Coplex Power in Balanced Three-Phase
More informationCompressive Sensing Over Networks
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu
More informationCh 12: Variations on Backpropagation
Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith
More informationThe Development of a Generalised Jet Mixing Model for the Derivation of Exclusion Zones in Hazardous Area Classification
The Developent of a Generalised Jet Mixing Model for the Derivation of Exclusion Zones in Hazardous Area Classification Katherine McCobe, Peter Tait, Jason Whitley LogiCas Ltd. 33 Boundary Street, Spring
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More information5.60 Thermodynamics & Kinetics Spring 2008
MIT OpenCourseWare http://ocw.it.edu 5.60 Therodynaics & Kinetics Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 1 Enzye Catalysis Readings: SAB,
More informationBootstrapping Dependent Data
Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationHand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture
J.V.S.Srinivas et al./ International Journal of Coputer Science & Engineering Technology (IJCSET) Hand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture J.V.S.SRINIVAS
More informationA Theoretical Analysis of a Warm Start Technique
A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful
More informationEnrico Nardelli Logic Circuits and Computer Architecture
Enrico Nardelli Logic Circuits and Computer Architecture Appendix B The design of VS0: a very simple CPU Rev. 1.4 (2009-10) by Enrico Nardelli B - 1 Instruction set Just 4 instructions LOAD M - Copy into
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationEstimating Parameters for a Gaussian pdf
Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3
More informationFast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns
Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu
More informationTHE DIGITAL LOGIC LEVEL
3 THE DIGITL LOGIC LEVEL 1 +V CC +V CC +V CC V out Collector V 1 V out V out V in V 2 V 1 V 2 ase Emitter (a) (b) (c) Figure 3-1. (a) transistor inverter. (b) NND gate. (c) NOR gate. NOT X NND X NOR X
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationSolutions of some selected problems of Homework 4
Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationINTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN
INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article
More informationGenetic Quantum Algorithm and its Application to Combinatorial Optimization Problem
Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr
More informationCS 700: Quantitative Methods & Experimental Design in Computer Science
CS 700: Quantitative Methods & Experimental Design in Computer Science Sanjeev Setia Dept of Computer Science George Mason University Logistics Grade: 35% project, 25% Homework assignments 20% midterm,
More information