Topic 1: Digital Data
|
|
- Gyles Daniels
- 5 years ago
- Views:
Transcription
1 Term paper: Judging the feasibility of a topic Is it a topic you are excited about? Is there enough existing research in this area to conduct a scholarly study? Topic 1: Digital Data ECS 15, Winter 2015 Lecture 3 Finding existing literature --- e.g., scholar.google.com, webofknowledge.com, pubmed.com (Note cited reference search see the follow-on work) What is my hypothesis? (What kind of interesting results can I expect to find?) How can I validate or invalidate my hypothesis? What are the implications of my conclusions? Some resources for research scholar.google.com Find articles on a particular topic Search through all follow-up work (i.e., papers that have hence cited the work of interest). apps.isiknowledge.com (Must be on ucdavis.edu network) (ISI Web of Knowledge/ Web of Science) (Like scholar.google.com only for scientific journal articles) UC Davis libraries (Thurs 1/22, Phoebe Ayers talk) Wikipedia (but look at page history to understand any controversies or debates) TED (Technology Entertainment and Design), Ideas worth spreading, Computer Science Theory of computation Software engineering Computer graphics Computer security and cryptography Computer networks Artificial intelligence Human-computer interface Bioinformatics Systems and architecture
2 Growth Mindset Test your mindset: Do you agree that intelligence is something about a person that he/she can t change very much? Strongly agree to strongly disagree Fixed mindset vs. growth mindset Can one learn to be good at computers? Yes, absolutely. And yes, absolutely worth your time and effort Google growth mindset for more information. Focus and concentration are skills! Practice distraction free hour Digital Data Binary and Hexadecimal numbers ASCII code and UNICODE Sampling and Quantitizing Example: sound Basic Concepts Binary and Hexadecimal numbers Number representation We are used to counting in base 10: ASCII code and UNICODE Example:.. thousands hundreds tens units Sampling and Quantitizing Example: sound x1000+7x100+3x10+2x1 = 1732 digits Terminology: most-significant digit / least-significant digit
3 Number representation Computers use a different system: base 2: Converting from base 2 to base 10 is simple. For instance: bits x1024+1x512+0x256+1x128+1x64+0x32+ 0x16+ 0x8 + 1x4 + 0x2 + 0x1 = 1732 Number representation Base 10 Base Facts about Binary Numbers Binary numbers, 8 bits = 1 byte - Each digit of a binary number (each 0 or 1) is called a bit - 1 byte = 8 bits - 1 KB = 1 kilobyte = 2 10 bytes = 1024 bytes ( 1 thousand bytes) - 1 MB = 1 Megabyte = 2 20 bytes = 1,048,580 bytes ( 1 million bytes) - 1 GB = 1 Gigabyte = 2 30 bytes = 1,073,741,824 bytes ( 1 billion bytes) - 1 TB = 1 Tetabyte = 2 40 bytes = 1,099,511,627,776 bytes ( 1 trillion bytes) - A byte can represent numbers up to 255: (base 2) = 255 (base 10) - The maximum number represented by a binary number of size N is 2 N The maximum number represented by a binary number of size N is 2 N = 63 = = A byte (8 bits) can represent numbers ranging from 0 up to = (base 2) = 255 (base 10)
4 Algorithms to convert from base10 to base2 (Recall base2 to base10 simple and direct) 1. The modulus algorithm, bottom-up (determine least significant bit first) Let m be a base 10 number. Convert m to a base 2 number: 1. The bottom-up modulus algorithm (determine least significant bit first). The operation a % b (said a mod b ) returns the remainder when a is divided by b. 2. The top-down recursive algorithm (determine most significant bit first). From base 10 to base 2: 1877 %2 = 938 Remainder %2 = 469 Remainder %2 = 234 Remainder %2 = 117 Remainder %2 = 58 Remainder 1 58 %2 = 29 Remainder 0 29 %2 = 14 Remainder 1 14 %2 = 7 Remainder 0 7 %2 = 3 Remainder 1 3 %2 = 1 Remainder 1 1 %2 = 0 Remainder 1 Read off number from last determined back to first (to get ordering from most significant to least) (base10) = (base 2) 2. The recursive algorithm, top-down (determine most significant bit first and repeat) Let m be a base 10 number. Convert m to a base 2 number: 1. Identify biggest n such that 2 n m. 2. Place a 1 in the slot corresponding to 2 n. (The n+1 slot!) 3. Subtract: m = m 2 n 4. Repeat steps 1 to 3 with m=m, continue until m =0. Base 10: Base 2: Digital data: Base 10, Base 2, Base 16: thousands hundreds tens units The digits are: e.g., m = Step 1: 1 in 11 th slot (2 10 =1024); m = = 29. Step 2: 1 in 5 th slot (2 4 =16); m = = 13. Step 3: 1 in 4 th slot (2 3 =8); m = 13-8 = 5. Step 4: 1 in 3 rd slot (2 2 =4); m = 5-4 = 1. Step 5: 1 in 1 st slot (2 0 =1); m =0. So 1053 in base 10 = in base The digits are: 0 1 Base 16: The digits are: A B C D E F
5 In class exercise, part I 1. Choose at random a base 2 number, of 8 digits in length, with four 1 s and four 0 s interspersed. Convert it to the corresponding base 10 number. Hexadecimal numbers While base 10 and base 2 are the most common bases used to represent numbers, others are also possible: base 16 is another popular one, corresponding to hexadecimal numbers Choose at random a 4-digit base 10 number (less than 2048 is good). Make sure it is not a simple power of 2. Convert it into the corresponding binary number The digits are: A B C D E F Example: 2 A F x * x1 = 687 Hexadecimal numbers Everything we have learned in base 10 should be studied again in other bases!! Example: multiplication table in base 16: Number representation Base 10 Base 2 Base A B C D E F
6 Conversion: From base 2 to base 16, and back This is in fact easy!! - From base 2 to base 16: Example: Step 1: break into groups of 4 (starting from the right): Step 2: pad left-most with 0, if needed: Step 3: convert each group of 4, using table: 6 C 4 Step 4: regroup: 6C (base 2) = 6C4 (base 16) Conversion: From base 2 to base 16, and back From base 16 to base 2: Example: 4FD Step 1: split: 4 F D Step 2: convert each digit, using table: Step 3: Remove leading 0, if needed Step 4: regroup: FD (base 16) = (base 2) In class exercise, part II 3. Convert this hexadecimal number to base 10: 2A3F Basic Concepts Binary and Hexadecimal numbers ASCII code and UNICODE Sampling and Quantitizing Example: sound
7 ASCII American Standard Code for Information Interchange So far, we have seen how computers can handle numbers. What about letters / characters? The ASCII code was designed for that: it assigns a number to each character: A-Z: a-z: : UNICODE ASCII only contains 127 characters (though an extended version exists with 257 characters). This is by far not enough as it is too restrictive to the English language. UNICODE was developed to alleviate this problem: the latest version, UNICODE contains more than 100,000 characters, covering most existing languages. For more information, see: Basic Concepts Binary and Hexadecimal numbers ASCII code and UNICODE Sampling and Quantitizing Example: sound
8 Digital Sound What is sound? Transverse and longitudinal waves Sound is produced by the vibration of a media like air or water. Audio refers to the sound within the range of human hearing. Naturally, a sound signal is analog, i.e. continuous in both time and amplitude. These are analog, continuous waves. To store and process sound information in a computer or to transmit it through a computer network, we must first convert the analog signal to digital form using an analog-to-digital converter ( ADC ); the conversion involves two steps: (1) sampling, and (2) quantization. Sampling Sampling is the process of examining the value of a continuous function at regular intervals. Sampling Note that choosing the sampling rate is not innocent (not without consequence): Sampling usually occurs at uniform intervals, which are referred to as sampling intervals. The reciprocal of sampling interval is referred to as the sampling frequency or sampling rate. If the sampling is done in time domain, the unit of sampling interval is second and the unit of sampling rate is Hz, which means cycles per second. How do we choose the sampling rate?
9 How do we choose the sampling rate? Quantization Quantization is the process of limiting the value of a sample of a continuous function to one of a predetermined number of allowed values, which can then be represented by a finite number of bits. A higher sampling rate usually allows for a better representation of the original sound wave. However, when the sampling rate is set to twice the highest frequency in the signal, the original sound wave can be reconstructed without loss from the samples. This is known as the Nyquist theorem. Quantization (The allowed amplitudes) The number of bits used to store each intensity defines the accuracy of the digital sound: Adding one bit makes the sample twice as accurate
8/13/16. Data analysis and modeling: the tools of the trade. Ø Set of numbers. Ø Binary representation of numbers. Ø Floating points.
Data analysis and modeling: the tools of the trade Patrice Koehl Department of Biological Sciences National University of Singapore http://www.cs.ucdavis.edu/~koehl/teaching/bl5229 koehl@cs.ucdavis.edu
More information12/31/2010. Digital Operations and Computations Course Notes. 01-Number Systems Text: Unit 1. Overview. What is a Digital System?
Digital Operations and Computations Course Notes 0-Number Systems Text: Unit Winter 20 Professor H. Louie Department of Electrical & Computer Engineering Seattle University ECEGR/ISSC 20 Digital Operations
More informationIntroduction to digital systems. Juan P Bello
Introduction to digital systems Juan P Bello Analogue vs Digital (1) Analog information is made up of a continuum of values within a given range At its most basic, digital information can assume only one
More informationSimple Interactions CS 105 Lecture 2 Jan 26. Matthew Stone
Simple Interactions CS 105 Lecture 2 Jan 26 Matthew Stone Rutgers University Department of Computer Science and Center for Cognitive Science Themes from the Preface 2 Computers are multimedia devices Text
More information8/19/16. Fourier Analysis. Fourier analysis: the dial tone phone. Fourier analysis: the dial tone phone
Patrice Koehl Department of Biological Sciences National University of Singapore http://www.cs.ucdavis.edu/~koehl/teaching/bl5229 koehl@cs.ucdavis.edu Fourier analysis: the dial tone phone We use Fourier
More information! Where are we on course map? ! What we did in lab last week. " How it relates to this week. ! Compression. " What is it, examples, classifications
Lecture #3 Compression! Where are we on course map?! What we did in lab last week " How it relates to this week! Compression " What is it, examples, classifications " Probability based compression # Huffman
More informationNumber Theory: Representations of Integers
Instructions: In-class exercises are meant to introduce you to a new topic and provide some practice with the new topic. Work in a team of up to 4 people to complete this exercise. You can work simultaneously
More informationECE260: Fundamentals of Computer Engineering
Data Representation & 2 s Complement James Moscola Dept. of Engineering & Computer Science York College of Pennsylvania Based on Computer Organization and Design, 5th Edition by Patterson & Hennessy Data
More informationDesign of Digital Circuits Reading: Binary Numbers. Required Reading for Week February 2017 Spring 2017
Design of Digital Circuits Reading: Binary Numbers Required Reading for Week 1 23-24 February 2017 Spring 2017 Binary Numbers Design of Digital Circuits 2016 Srdjan Capkun Frank K. Gürkaynak http://www.syssec.ethz.ch/education/digitaltechnik_16
More informationName Period Date. RNS1.3 Scientific Notation Read and write large and small numbers. Use scientific notation to write numbers and solve problems.
Name Period Date REAL NUMBER SYSTEM Student Pages for Packet : RNS. Conjectures About Make conjectures about multiplication with eponents. Use eponent definitions and rules to simplify epressions. RNS.
More informationComputer Number Systems
Computer Number Systems All computers are electronic devices and can ultimately do one thing: detect whether an electrical signal is on or off. Therefore, the earliest computer scientists realized that
More informationDigital Systems Roberto Muscedere Images 2013 Pearson Education Inc. 1
Digital Systems Digital systems have such a prominent role in everyday life The digital age The technology around us is ubiquitous, that is we don t even notice it anymore Digital systems are used in:
More informationDigital Electronics Part 1: Binary Logic
Digital Electronics Part 1: Binary Logic Electronic devices in your everyday life What makes these products examples of electronic devices? What are some things they have in common? 2 How do electronics
More informationMATH Dr. Halimah Alshehri Dr. Halimah Alshehri
MATH 1101 haalshehri@ksu.edu.sa 1 Introduction To Number Systems First Section: Binary System Second Section: Octal Number System Third Section: Hexadecimal System 2 Binary System 3 Binary System The binary
More informationChapter 1 - Introduction
Chapter 1 - Introduction Aims: Outline of the history of the computer. Contrasting hardware and software. Definition of basic terms. Contrasting data and information Contrast differing processing methods
More informationUnit 3. Digital encoding
Unit 3. Digital encoding Digital Electronic Circuits (Circuitos Electrónicos Digitales) E.T.S.I. Informática Universidad de Sevilla 9/2012 Jorge Juan 2010, 2011, 2012 You are free to
More informationCSEN102 Introduction to Computer Science
CSEN102 Introduction to Computer Science Lecture 7: Representing Information I Prof. Dr. Slim Abdennadher Dr. Mohammed Salem, slim.abdennadher@guc.edu.eg, mohammed.salem@guc.edu.eg German University Cairo,
More informationENG2410 Digital Design Introduction to Digital Systems. Fall 2017 S. Areibi School of Engineering University of Guelph
ENG2410 Digital Design Introduction to Digital Systems Fall 2017 S. Areibi School of Engineering University of Guelph Resources Chapter #1, Mano Sections 1.1 Digital Computers 1.2 Number Systems 1.3 Arithmetic
More informationDigital Systems and Information Part II
Digital Systems and Information Part II Overview Arithmetic Operations General Remarks Unsigned and Signed Binary Operations Number representation using Decimal Codes BCD code and Seven-Segment Code Text
More informationENGIN 112 Intro to Electrical and Computer Engineering
ENGIN 112 Intro to Electrical and Computer Engineering Lecture 3 More Number Systems Overview Hexadecimal numbers Related to binary and octal numbers Conversion between hexadecimal, octal and binary Value
More informationNumbering Systems. Contents: Binary & Decimal. Converting From: B D, D B. Arithmetic operation on Binary.
Numbering Systems Contents: Binary & Decimal. Converting From: B D, D B. Arithmetic operation on Binary. Addition & Subtraction using Octal & Hexadecimal 2 s Complement, Subtraction Using 2 s Complement.
More informationICS141: Discrete Mathematics for Computer Science I
ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by
More informationCryptography Lecture 3. Pseudorandom generators LFSRs
Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via
More informationCPE100: Digital Logic Design I
Chapter 1 Professor Brendan Morris, SEB 3216, brendan.morris@unlv.edu http://www.ee.unlv.edu/~b1morris/cpe100/ CPE100: Digital Logic Design I Section 1004: Dr. Morris From Zero to One Chapter 1 Background:
More informationWe say that the base of the decimal number system is ten, represented by the symbol
Introduction to counting and positional notation. In the decimal number system, a typical number, N, looks like... d 3 d 2 d 1 d 0.d -1 d -2 d -3... [N1] where the ellipsis at each end indicates that there
More informationB. Converting Numbers in Base ten to other bases Example
FIRST TERM WEEK 1: NUMBER BASE SYSTEM Conversion can be done from other bases to base 10 For instance i. Denary or decimal number which is base 10 and the highest digit is 9 i.e. 0, 1, 2,, 4, 5, 6, 7,
More informationhexadecimal-to-decimal conversion
OTHER NUMBER SYSTEMS: octal (digits 0 to 7) group three binary numbers together and represent as base 8 3564 10 = 110 111 101 100 2 = (6X8 3 ) + (7X8 2 ) + (5X8 1 ) + (4X8 0 ) = 6754 8 hexadecimal (digits
More information17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.
( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use
More informationAlgorithms: Review from last time
EECS 203 Spring 2016 Lecture 9 Page 1 of 9 Algorithms: Review from last time 1. For what values of C and k (if any) is it the case that x 2 =O(100x 2 +4)? 2. For what values of C and k (if any) is it the
More informationENGIN 112 Intro to Electrical and Computer Engineering
ENGIN 112 Intro to Electrical and Computer Engineering Lecture 2 Number Systems Russell Tessier KEB 309 G tessier@ecs.umass.edu Overview The design of computers It all starts with numbers Building circuits
More informationCOURSE CONTENT for Computer Science & Engineering [CSE]
COURSE CONTENT for Computer Science & Engineering [CSE] 1st Semester 1 HU 101 English Language & Communication 2 1 0 3 3 2 PH 101 Engineering Physics 3 1 0 4 4 3 M 101 Mathematics 3 1 0 4 4 4 ME 101 Mechanical
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple
More information( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1
( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r 2 0 1 6 C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science In this chapter, we learn how data can
More informationEssentials of Intermediate Algebra
Essentials of Intermediate Algebra BY Tom K. Kim, Ph.D. Peninsula College, WA Randy Anderson, M.S. Peninsula College, WA 9/24/2012 Contents 1 Review 1 2 Rules of Exponents 2 2.1 Multiplying Two Exponentials
More informationStudents should be able to (a) produce a truth table from a given logic diagram
Truth tables Teacher s Notes Lesson Plan Length 60 mins Specification Link 2.1.2/f inary logic Learning objective Students should be able to (a) produce a truth table from a given logic diagram Time (min)
More informationCS1800: Hex & Logic. Professor Kevin Gold
CS1800: Hex & Logic Professor Kevin Gold Reviewing Last Time: Binary Last time, we saw that arbitrary numbers can be represented in binary. Each place in a binary number stands for a different power of
More informationWhat are binary numbers and why do we use them? BINARY NUMBERS. Converting decimal numbers to binary numbers
What are binary numbers and why do we use them? BINARY NUMBERS Converting decimal numbers to binary numbers The number system we commonly use is decimal numbers, also known as Base 10. Ones, tens, hundreds,
More informationIntroduction to Algebra: The First Week
Introduction to Algebra: The First Week Background: According to the thermostat on the wall, the temperature in the classroom right now is 72 degrees Fahrenheit. I want to write to my friend in Europe,
More informationCS1800 Discrete Structures Final Version A
CS1800 Discrete Structures Fall 2017 Profs. Aslam, Gold, & Pavlu December 11, 2017 CS1800 Discrete Structures Final Version A Instructions: 1. The exam is closed book and closed notes. You may not use
More informationECE 372 Microcontroller Design
Data Formats Humor There are 10 types of people in the world: Those who get binary and those who don t. 1 Information vs. Data Information An abstract description of facts, processes or perceptions How
More informationChapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)
CSE 54 Discrete Mathematics & Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices Integers & Algorithms (Section 2.5) by Kenneth H. Rosen, Discrete Mathematics & its Applications,
More informationDetermining Conversion Factors for Metric Units
Determining Conversion Factors for Metric Units Reading: Section 2.2: Units PRELAB ASSIGNMENT: Complete on a separate sheet. Your answer should be typewritten. Define: Base unit English system Metric system
More informationWeek No. 06: Numbering Systems
Week No. 06: Numbering Systems Numbering System: A numbering system defined as A set of values used to represent quantity. OR A number system is a term used for a set of different symbols or digits, which
More informationCSCB63 Winter Week10 - Lecture 2 - Hashing. Anna Bretscher. March 21, / 30
CSCB63 Winter 2019 Week10 - Lecture 2 - Hashing Anna Bretscher March 21, 2019 1 / 30 Today Hashing Open Addressing Hash functions Universal Hashing 2 / 30 Open Addressing Open Addressing. Each entry in
More informationStandard forms for writing numbers
Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,
More informationE40M. Binary Numbers. M. Horowitz, J. Plummer, R. Howe 1
E40M Binary Numbers M. Horowitz, J. Plummer, R. Howe 1 Reading Chapter 5 in the reader A&L 5.6 M. Horowitz, J. Plummer, R. Howe 2 Useless Box Lab Project #2 Adding a computer to the Useless Box alows us
More informationMeasurement and Instrumentation. Sampling, Digital Devices, and Data Acquisition
2141-375 Measurement and Instrumentation Sampling, Digital Devices, and Data Acquisition Basic Data Acquisition System Analog Form Analog Form Digital Form Display Physical varialble Sensor Signal conditioning
More informationNUMBERS AND CODES CHAPTER Numbers
CHAPTER 2 NUMBERS AND CODES 2.1 Numbers When a number such as 101 is given, it is impossible to determine its numerical value. Some may say it is five. Others may say it is one hundred and one. Could it
More informationNew Directions in Computer Science
New Directions in Computer Science John Hopcroft Cornell University Time of change The information age is a revolution that is changing all aspects of our lives. Those individuals, institutions, and nations
More information1 Maintaining a Dictionary
15-451/651: Design & Analysis of Algorithms February 1, 2016 Lecture #7: Hashing last changed: January 29, 2016 Hashing is a great practical tool, with an interesting and subtle theory too. In addition
More informationSection 4.7 Scientific Notation
Section 4.7 Scientific Notation INTRODUCTION Scientific notation means what it says: it is the notation used in many areas of science. It is used so that scientist and mathematicians can work relatively
More informationANNA UNIVERSITY, CHENNAI AFFILIATED INSTITUTIONS R-2013 B.E. COMPUTER SCIENCE AND ENGINEERING I TO VIII SEMESTER CURRICULUM AND SYLLABUS SEMESTER I
ANNA UNIVERSITY, CHENNAI AFFILIATED INSTITUTIONS R-2013 B.E. COMPUTER SCIENCE AND ENGINEERING I TO VIII SEMESTER CURRICULUM AND SYLLABUS SEMESTER I 1. HS6151 Technical English I 3 1 0 4 2. MA6151 Mathematics
More informationMat Week 8. Week 8. gcd() Mat Bases. Integers & Computers. Linear Combos. Week 8. Induction Proofs. Fall 2013
Fall 2013 Student Responsibilities Reading: Textbook, Section 3.7, 4.1, & 5.2 Assignments: Sections 3.6, 3.7, 4.1 Proof Worksheets Attendance: Strongly Encouraged Overview 3.6 Integers and Algorithms 3.7
More informationCHAPTER 1. REVIEW: NUMBERS
CHAPTER. REVIEW: NUMBERS Yes, mathematics deals with numbers. But doing math is not number crunching! Rather, it is a very complicated psychological process of learning and inventing. Just like listing
More informationStudent Responsibilities Week 8. Mat Section 3.6 Integers and Algorithms. Algorithm to Find gcd()
Student Responsibilities Week 8 Mat 2345 Week 8 Reading: Textbook, Section 3.7, 4.1, & 5.2 Assignments: Sections 3.6, 3.7, 4.1 Induction Proof Worksheets Attendance: Strongly Encouraged Fall 2013 Week
More informationCS4800: Algorithms & Data Jonathan Ullman
CS4800: Algorithms & Data Jonathan Ullman Lecture 22: Greedy Algorithms: Huffman Codes Data Compression and Entropy Apr 5, 2018 Data Compression How do we store strings of text compactly? A (binary) code
More informationRepresenting Numbers on the Computer
Representing Numbers on the Computer Let s calculate J! Program Maxnumber * * Check what the max numbers are on the computer * Integer N * * N= Do J=,2 N=N*J Print *,J,N Enddo stop end What happened? J
More informationLesson 1: Natural numbers
Lesson 1: Natural numbers Contents: 1. Number systems. Positional notation. 2. Basic arithmetic. Algorithms and properties. 3. Algebraic language and abstract reasoning. 4. Divisibility. Prime numbers.
More informationMulti-Map Orbit Hopping Chaotic Stream Cipher
Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum
More informationTerm Definition Example. 3-D shapes or (3 dimensional) acute angle. addend. algorithm. area of a rectangle. array
Term Definition Example 3-D shapes or (3 dimensional) an object that has height, width, and depth, like any object in the real world. acute angle an angle that is less than 90 addend a number that is added
More informationCPSC 121 Midterm 1 Tuesday, October 11th, 2011
CPSC 121 Midterm 1 Tuesday, October 11th, 2011 [1] 1. Do you want tutorial attendance to be mandatory for you? If you answer yes, then 1% of tuts attended your course grade will be calculated with min(100%,
More informationMeasurement 4: Scientific Notation
Q Skills Review The Decimal System Measurement 4: Scientific Notation Dr. C. Stewart We are so very familiar with our decimal notation for writing numbers that we usually take it for granted and do not
More informationConversions between Decimal and Binary
Conversions between Decimal and Binary Binary to Decimal Technique - use the definition of a number in a positional number system with base 2 - evaluate the definition formula ( the formula ) using decimal
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory
More informationCMPT 889: Lecture 3 Fundamentals of Digital Audio, Discrete-Time Signals
CMPT 889: Lecture 3 Fundamentals of Digital Audio, Discrete-Time Signals Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University October 6, 2005 1 Sound Sound waves are longitudinal
More informationCSE 20: Discrete Mathematics
Spring 2018 Summary So far: Today: Logic and proofs Divisibility, modular arithmetics Number Systems More logic definitions and proofs Reading: All of Chap. 1 + Chap 4.1, 4.2. Divisibility P = 5 divides
More informationUnderstanding Decimal Addition
2 Understanding Decimal Addition 2.1 Experience Versus Understanding This book is about understanding system architecture in a quick and clean way: no black art, nothing you can only get a feeling for
More informationDiscrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7
EECS 70 Discrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7 Polynomials Polynomials constitute a rich class of functions which are both easy to describe and widely applicable in topics
More information2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51
2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 15 October 20, 2014 CPSC 467, Lecture 15 1/37 Common Hash Functions SHA-2 MD5 Birthday Attack on Hash Functions Constructing New
More informationFundamentals of Mathematics I
Fundamentals of Mathematics I Kent State Department of Mathematical Sciences Fall 2008 Available at: http://www.math.kent.edu/ebooks/10031/book.pdf August 4, 2008 Contents 1 Arithmetic 2 1.1 Real Numbers......................................................
More information(So SamID 1 ( ) = Ken W. Smith.)
In an earlier lesson, we introduced functions by assigning US citizens a social security number (SSN ) or by assigning students and staff at Sam Houston State University a student ID (SamID) The function
More informationNatural Language Processing Prof. Pawan Goyal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Natural Language Processing Prof. Pawan Goyal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 18 Maximum Entropy Models I Welcome back for the 3rd module
More informationLecture 6: Introducing Complexity
COMP26120: Algorithms and Imperative Programming Lecture 6: Introducing Complexity Ian Pratt-Hartmann Room KB2.38: email: ipratt@cs.man.ac.uk 2015 16 You need this book: Make sure you use the up-to-date
More informationCounting in Different Number Systems
Counting in Different Number Systems Base 1 (Decimal) is important because that is the base that we first learn in our culture. Base 2 (Binary) is important because that is the base used for computer codes
More informationTOPIC 3: READING AND REPORTING NUMERICAL DATA
Page 1 TOPIC 3: READING AND REPORTING NUMERICAL DATA NUMERICAL DATA 3.1: Significant Digits; Honest Reporting of Measured Values Why report uncertainty? That is how you tell the reader how confident to
More informationAppendix: a brief history of numbers
Appendix: a brief history of numbers God created the natural numbers. Everything else is the work of man. Leopold Kronecker (1823 1891) Fundamentals of Computing 2017 18 (2, appendix) http://www.dcs.bbk.ac.uk/~michael/foc/foc.html
More informationDigital Circuits, Binary Numbering, and Logic Gates Cornerstone Electronics Technology and Robotics II
Digital Circuits, Binary Numbering, and Logic Gates Cornerstone Electronics Technology and Robotics II Administration: o Prayer Electricity and Electronics, Section 20.1, Digital Fundamentals: o Fundamentals:
More informationChapter 2. A Look Back. 2.1 Substitution ciphers
Chapter 2 A Look Back In this chapter we take a quick look at some classical encryption techniques, illustrating their weakness and using these examples to initiate questions about how to define privacy.
More informationBU CAS CS 538: Cryptography Lecture Notes. Fall itkis/538/
BU CAS CS 538: Cryptography Lecture Notes. Fall 2005. http://www.cs.bu.edu/ itkis/538/ Gene Itkis Boston University Computer Science Dept. Notes for Lectures 3 5: Pseudo-Randomness; PRGs 1 Randomness Randomness
More informationFinding Prime Factors
Section 3.2 PRE-ACTIVITY PREPARATION Finding Prime Factors Note: While this section on fi nding prime factors does not include fraction notation, it does address an intermediate and necessary concept to
More informationEfficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading
ECE646 Lecture 10 RSA Implementation: Efficient Encryption & Decryption Required Reading W. Stallings, "Cryptography and etwork-security, Chapter 9.2 The RSA Algorithm Chapter 8.4 The Chinese Remainder
More informationMark Redekopp, All rights reserved. Lecture 1 Slides. Intro Number Systems Logic Functions
Lecture Slides Intro Number Systems Logic Functions EE 0 in Context EE 0 EE 20L Logic Design Fundamentals Logic Design, CAD Tools, Lab tools, Project EE 357 EE 457 Computer Architecture Using the logic
More informationInformation and Entropy. Professor Kevin Gold
Information and Entropy Professor Kevin Gold What s Information? Informally, when I communicate a message to you, that s information. Your grade is 100/100 Information can be encoded as a signal. Words
More informationCHAPTER 7. Exercises 17/ / /2 2 0
CHAPTER 7 Exercises E7. (a) For the whole part, we have: Quotient Remainders 23/2 /2 5 5/2 2 2/2 0 /2 0 Reading the remainders in reverse order, we obtain: 23 0 = 0 2 For the fractional part we have 2
More informationEigenvalues and eigenvectors
Roberto s Notes on Linear Algebra Chapter 0: Eigenvalues and diagonalization Section Eigenvalues and eigenvectors What you need to know already: Basic properties of linear transformations. Linear systems
More informationCSE 241 Digital Systems Spring 2013
CSE 241 Digital Systems Spring 2013 Instructor: Prof. Kui Ren Department of Computer Science and Engineering Lecture slides modified from many online resources and used solely for the educational purpose.
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?
More informationNumber Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers
Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications
More informationArithmetic with Whole Numbers and Money Variables and Evaluation
LESSON 1 Arithmetic with Whole Numbers and Money Variables and Evaluation Power Up 1 facts mental math Building Power Power Up A A score is 20. Two score and 4 is 44. How many is a. Measurement: 3 score
More informationModern Digital Communication Techniques Prof. Suvra Sekhar Das G. S. Sanyal School of Telecommunication Indian Institute of Technology, Kharagpur
Modern Digital Communication Techniques Prof. Suvra Sekhar Das G. S. Sanyal School of Telecommunication Indian Institute of Technology, Kharagpur Lecture - 15 Analog to Digital Conversion Welcome to the
More informationEECE 2510 Circuits and Signals, Biomedical Applications Final Exam Section 3. Name:
EECE 2510 Circuits and Signals, Biomedical Applications Final Exam Section 3 Instructions: Closed book, closed notes; Computers and cell phones are not allowed Scientific calculators are allowed Complete
More informationCSE 20. Lecture 4: Introduction to Boolean algebra. CSE 20: Lecture4
CSE 20 Lecture 4: Introduction to Boolean algebra Reminder First quiz will be on Friday (17th January) in class. It is a paper quiz. Syllabus is all that has been done till Wednesday. If you want you may
More informationMath 230 Assembly Language Programming (Computer Organization) Numeric Data Lecture 2
Math 230 Assembly Language Programming (Computer Organization) Numeric Data Lecture 2 1 Decimal Numbers Recall base 10 3582 = 3000 + 500 + 80 + 2 = 3 10 3 + 5 10 2 + 8 10 1 + 2 10 0 2 Positional Notation
More informationToday s Topics. Methods of proof Relationships to logical equivalences. Important definitions Relationships to sets, relations Special functions
Today s Topics Set identities Methods of proof Relationships to logical equivalences Functions Important definitions Relationships to sets, relations Special functions Set identities help us manipulate
More informationCISC 1400 Discrete Structures
CISC 1400 Discrete Structures Chapter 2 Sequences What is Sequence? A sequence is an ordered list of objects or elements. For example, 1, 2, 3, 4, 5, 6, 7, 8 Each object/element is called a term. 1 st
More informationCalifornia 5 th Grade Standards / Excel Math Correlation by Lesson Number
(Activity) L1 L2 L3 Excel Math Objective Recognizing numbers less than a million given in words or place value; recognizing addition and subtraction fact families; subtracting 2 threedigit numbers with
More informationNUMBERS It s the numbers that count
NUMBERS It s the numbers that count Starting from the intuitively obvious this note discusses some of the perhaps not so intuitively obvious aspects of numbers. Henry 11/1/2011 NUMBERS COUNT! Introduction
More informationIntroduction to Algorithms
Lecture 1 Introduction to Algorithms 1.1 Overview The purpose of this lecture is to give a brief overview of the topic of Algorithms and the kind of thinking it involves: why we focus on the subjects that
More informationDecision Trees. CSC411/2515: Machine Learning and Data Mining, Winter 2018 Luke Zettlemoyer, Carlos Guestrin, and Andrew Moore
Decision Trees Claude Monet, The Mulberry Tree Slides from Pedro Domingos, CSC411/2515: Machine Learning and Data Mining, Winter 2018 Luke Zettlemoyer, Carlos Guestrin, and Andrew Moore Michael Guerzhoy
More information