Lecture 20: Sequential Circuits. Sequencing

Size: px
Start display at page:

Download "Lecture 20: Sequential Circuits. Sequencing"

Transcription

1 Lecture 20: Sequential Circuits Sequencing Elements Simple /FF Timing efinitions Source: Ch 7 (W&H) Sequencing Use flip-flops to delay fast tokens so they move through exactly one stage each cycle. Inevitably adds some delay to the slow tokens Sequencing overhead Combinational logic output depends on current inputs Sequential logic output depends on current and previous inputs Called state or tokens Ex: FSM, pipeline in out Finite State Machine Pipeline 1

2 Sequencing Elements : Level sensitive a.k.a. Flip-flop: edge triggered a.k.a. Timing iagrams Flop (latch) (flop) esign Pass Transistor Pros Cons Used in 1970 s 2

3 3 esign Transmission gate - Inverting buffer X esign Tristate feedback Buffered input X X

4 4 esign Buffered output Widely used in standard cells X Flip-Flop esign Flip-flop is built as pair of back-to-back latches X X

5 Reset Force output low when asserted Synchronous vs. asynchronous Symbol Flop Synchronous Reset Asynchronous Reset Sequencing Methods Flip-flops 2-Phase es Pulsed es Flip-Flops Flop Flop 2-Phase Transparent es Pulsed es 1 2 p t pw p /2 Combinational Logic t nonoverlap Combinational Logic Half-Cycle 1 Half-Cycle 1 t nonoverlap p 5

6 Timing iagrams Contamination and Propagation elays A Combinational Logic Y A Y t cd t pd t pd t cd t setup thold Flop t ccq t ccq t pdq t ccq t setup t setup t cdq t pdq Max-elay: Flip-Flops F1 1 2 F2 t setup 1 t pd 2 6

7 EX T adder =590ps T result_mux =60ps T middle_bypass_mux =80ps T late_bypass_mux =70ps 2mm wire=100ps each T setup =62ps T hold =-10ps T pcq =90ps T pd =1000ps T C > ps Max elay: 2-Phase es tpd tpd1tpd 2 Tc 2tpdq sequencing overhead Combinational 2 2 Combinational 3 Logic 1 Logic 2 L1 L2 L t pdq1 1 t pd1 2 t pdq2 2 t pd2 3 7

8 Max elay: Pulsed es tpd Tc max tpdq, tpcq tsetup tpw sequencing overhead p p 1 L1 1 2 L2 2 1 t pdq (a) t pw > t setup 1 t pd 2 p (b) t pw < t setup 1 2 t pw tpd tsetup Min-elay: Flip-Flops < t ccq t cd t t t cd hold ccq F1 1 2 F2 1 t ccq t cd 2 8

9 Min-elay: 2-Phase es T hold <T nonoverlap t ccq d t t t t t cd1, cd 2 hold ccq nonoverlap 1 L L2 t nonoverlap 1 2 t ccq 1 t cd 2 Min-elay: Pulsed es p L1 t pw < t ccq t cd t t t t cd hold ccq pw 1 Hold time increased by pulse width p 2 L2 p tpw 1 t ccq t cd 2 9

10 In a flop-based system: Time Borrowing ata launches on one rising edge Must setup before next rising edge If it arrives late, system fails If it arrives early, time is wasted Flops have hard edges In a latch-based system ata can pass through latch while transparent Long cycle of logic can borrow time into next As long as each loop completes in one cycle Time Borrowing Example (a) Combinational Logic Borrowing time across half-cycle boundary Borrowing time across pipeline stage boundary 1 2 (b) Combinational Logic Loops may borrow time internally but must complete within the cycle 10

11 How Much Borrowing? 2-Phase es T borrow c setup nonoverlap t t t 2 Pulsed es t t t borrow pw setup L L2 2 t pw >t setup 1 2 t nonoverlap /2 Nominal Half-Cycle 1 elay t borrow t setup 2 Skew: Flip-Flops F1 1 2 F2 t T t t t pd c pcq setup skew sequencing overhead t skew t t t t cd hold ccq skew 1 2 t pdq t setup cq d >T skew F1 1 ecreases maximum propagation delay Increases minimum contamination delay 2 F2 t skew 1 t ccq 2 t cd 11

12 Skew: es 2-Phase es tpd Tc 2tpdq sequencing overhead t, t t t t t cd1 cd 2 hold ccq nonoverlap skew T t t t t 2 c borrow setup nonoverlap skew Combinational 2 2 Combinational 3 Logic 1 Logic 2 L1 Pulsed es t T max t, t t t t pd c pdq pcq setup pw skew sequencing overhead t t t t t cd hold pw ccq t t t t skew borrow pw setup skew L2 L3 3 Two-Phase Clocking If setup times are violated, reduce clock speed If hold times are violated, chip fails at any speed In this class, working chips are most important No tools to analyze clock skew An easy way to guarantee hold times is to use 2-phase latches with big nonoverlap times Call these clocks 1, 2 (ph1, ph2) 12

13 Summary Flip-Flops: Very easy to use, supported by all tools 2-Phase Transparent es: Lots of skew tolerance and time borrowing Pulsed es: Fast, some skew tol & borrow, hold time risk 13

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues)

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2007 by Mark Horowitz w/ material from David Harris 1

More information

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-

More information

Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann

Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann Chapter 7 Registers & Register Transfers J. J. Shann J.J. Shann Chapter Overview 7-1 Registers and Load Enable 7-2 Register Transfers 7-3 Register Transfer Operations 7-4 A Note for VHDL and Verilog Users

More information

Sequential Gates. Gate Level Design. Young Won Lim 3/15/16

Sequential Gates. Gate Level Design. Young Won Lim 3/15/16 equential Gates Gate Level esign Copyright (c) 2011-2016 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free ocumentation License, Version

More information

Lecture 8: Skew Tolerant Domino Clocking

Lecture 8: Skew Tolerant Domino Clocking Lecture 8: Skew Tolerant Domino Clocking Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2001 by Mark Horowitz (Original Slides from David Harris) 1 Introduction Domino

More information

Finite state machines (cont d)

Finite state machines (cont d) Finite state machines (cont d)! Another type of shift register " Linear-feedback shift register (LFSR)! Used to generate pseudo-random numbers! Some FSM examples Autumn 2014 CSE390C - VIII - Finite State

More information

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015 /4/25 C2: Digital Design http://jatinga.iitg.ernet.in/~asahu/cs22 FSM Optimization Outline FSM : State minimization Row Matching Method, Implication chart method, FSM Partitioning FSM Encoding: Random,

More information

Practice 10: Ratioed Logic

Practice 10: Ratioed Logic Practice 0: Ratioed Logic Digital Electronic Circuits Semester A 0 Ratioed vs. Non-Ratioed Standard CMOS is a non-ratioed logic family, because: The logic function will be correctly implemented regardless

More information

Derivation of State Graphs and Tables UNIT 14 DERIVATION OF STATE GRAPHS AND TABLES. Designing a Sequential Circuit. Sequence Detectors

Derivation of State Graphs and Tables UNIT 14 DERIVATION OF STATE GRAPHS AND TABLES. Designing a Sequential Circuit. Sequence Detectors Derivation of State Graphs and Tables 2 Contents Case studies: sequence detectors Guidelines for construction of graphs Serial data code conversion Alphanumeric graph notation Reading Unit 4 Basic unit

More information

Delay Budgeting in Sequential Circuit with Application on FPGA Placement

Delay Budgeting in Sequential Circuit with Application on FPGA Placement 13.2 Delay Budgeting in Sequential Circuit with Application on FPGA Placement Chao-Yang Yeh and Malgorzata Marek-Sadowska Department of Electrical and Computer Engineering, University of California, Santa

More information

Statistical Static Timing Analysis: How simple can we get?

Statistical Static Timing Analysis: How simple can we get? Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern

More information

Lecture outline W.B. Powell 1

Lecture outline W.B. Powell 1 Lecture outline Applications of the newsvendor problem The newsvendor problem Estimating the distribution and censored demands The newsvendor problem and risk The newsvendor problem with an unknown distribution

More information

ITM1010 Computer and Communication Technologies

ITM1010 Computer and Communication Technologies ITM omputer and ommunication Technologies Lecture #5 Part I: Introduction to omputer Technologies K-Map, ombination and Sequential Logic ircuits ITM 計算機與通訊技術 2 Product Product-Of Of-Sum onfiguration Sum

More information

A Heuristic Method for Statistical Digital Circuit Sizing

A Heuristic Method for Statistical Digital Circuit Sizing A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance

More information

How Computers Work Lecture 12

How Computers Work Lecture 12 How Computers Work Lecture 12 A Common Chore of College Life Introduction to Pipelining How Computers Work Lecture 12 Page 1 How Computers Work Lecture 12 Page 2 Page 1 1 Propagation Times Doing 1 Load

More information

The good, the bad and the statistical

The good, the bad and the statistical The good, the bad and the statistical Noel Menezes Strategic CAD Labs Design and Technology Solutions Intel Corp. Acknowledgements Keith Bowman Yossi Abulafia Steve Burns Mahesh Ketkar Vivek De Jim Tschanz

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the reward function Must (learn to) act so as to maximize expected rewards Grid World The agent

More information

Moving PUFs out of the lab

Moving PUFs out of the lab Moving PUFs out of the lab Patrick Schaumont 2/3/2012 Research results by Abhranil Maiti, Jeff Casarona, Luke McHale, Logan McDougall, Vikash Gunreddy, Michael Cantrell What is a Physical Unclonable Function?

More information

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at

More information

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the

More information

Chapter 9 Theoretical Probability Models

Chapter 9 Theoretical Probability Models Making Hard Decisions Chapter 9 Theoretical Probability Models Slide 1 of 47 Theoretical Models Applied Theoretical Probability Models may be used when they describe the physical model "adequately" Examples:

More information

www.unique-project.eu Exchange of security-critical data Computing Device generates, stores and processes security-critical information Computing Device 2 However: Cryptographic secrets can be leaked by

More information

LTE RF Planning Training LTE RF Planning, Design, Optimization Training

LTE RF Planning Training LTE RF Planning, Design, Optimization Training LTE RF Planning Training LTE RF Planning, Design, Optimization Training Why should you choose LTE RF Planning Training? LTE RF Planning Training is focused on carrying out RF planning and Design and capacity

More information

Legend expert advisor

Legend expert advisor Legend expert advisor EA Highlights Developed by a team of professional traders and programmers. 2 extraordinary strategies combine to form one easy to use professional trading system. Strategies designed

More information

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 Lecture 17 & 18: Markov Decision Processes Oct 12 13, 2010 A subset of Lecture 9 slides from Dan Klein UC Berkeley Many slides over the course

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

RSI 2 System. for Shorter term SWING trading and Longer term TREND following. Dave Di Marcantonio 2016

RSI 2 System. for Shorter term SWING trading and Longer term TREND following. Dave Di Marcantonio 2016 RSI 2 System for Shorter term SWING trading and Longer term TREND following Dave Di Marcantonio 2016 ddimarc@gmail.com Disclaimer Dave Di Marcantonio Disclaimer & Terms of Use All traders and self-directed

More information

Chapter 1: Data Storage

Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Data Storage 1.1 Bits and

More information

10703 Deep Reinforcement Learning and Control

10703 Deep Reinforcement Learning and Control 10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Machine Learning Department rsalakhu@cs.cmu.edu Temporal Difference Learning Used Materials Disclaimer: Much of the material and slides

More information

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application

More information

9. Global Supply Chains and Decision Analysis. BIA Supply Chain Analytics

9. Global Supply Chains and Decision Analysis. BIA Supply Chain Analytics 9. Global Supply Chains and Decision Analysis BIA 674 - Supply Chain Analytics Intro to Decision Analysis Some introductory probability concepts Decision Making under Uncertainty Simple examples of probabilities

More information

Formal-based Coverage-Driven Verification. Sia Karthik Madabhushi May 15, 2014

Formal-based Coverage-Driven Verification. Sia Karthik Madabhushi May 15, 2014 Formal-based Coverage-Driven Verification Sia Karthik Madabhushi May 15, 2014 Preface In the future formal apps & methodologies will be the default for verification Consequently, it s critical for formal

More information

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add; CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the

More information

The OSU Risk Institute Launch. James Lam President ph: ERM and Business Strategy.

The OSU Risk Institute Launch. James Lam President ph: ERM and Business Strategy. The OSU Risk Institute Launch ERM and Business Strategy October 23, 2014 James Lam President ph: 781.772.1961 james@jameslam.com www.jameslam.com Filename Key take-aways for today 1. Risks we face are

More information

Lecture 14: Basic Fixpoint Theorems (cont.)

Lecture 14: Basic Fixpoint Theorems (cont.) Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E

More information

Computational Independence

Computational Independence Computational Independence Björn Fay mail@bfay.de December 20, 2014 Abstract We will introduce different notions of independence, especially computational independence (or more precise independence by

More information

CSE 473: Artificial Intelligence

CSE 473: Artificial Intelligence CSE 473: Artificial Intelligence Markov Decision Processes (MDPs) Luke Zettlemoyer Many slides over the course adapted from Dan Klein, Stuart Russell or Andrew Moore 1 Announcements PS2 online now Due

More information

Making Decisions. CS 3793 Artificial Intelligence Making Decisions 1

Making Decisions. CS 3793 Artificial Intelligence Making Decisions 1 Making Decisions CS 3793 Artificial Intelligence Making Decisions 1 Planning under uncertainty should address: The world is nondeterministic. Actions are not certain to succeed. Many events are outside

More information

Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration

Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration Piyush Rai CS5350/6350: Machine Learning November 29, 2011 Reinforcement Learning Supervised Learning: Uses explicit supervision

More information

FPGA PUF Based on Programmable LUT Delays

FPGA PUF Based on Programmable LUT Delays FPGA PUF Based on Programmable LUT Delays Bilal Habib Kris Gaj Jens-Peter Kaps Cryptographic Engineering Research Group (CERG) http://cryptography.gmu.edu Department of ECE, Volgenau School of Engineering,

More information

Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration

Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration Reinforcement Learning (1): Discrete MDP, Value Iteration, Policy Iteration Piyush Rai CS5350/6350: Machine Learning November 29, 2011 Reinforcement Learning Supervised Learning: Uses explicit supervision

More information

Business Case Modelling 2 Day Course This course is presented in London on: October, May 2018, November 2018

Business Case Modelling 2 Day Course This course is presented in London on: October, May 2018, November 2018 Business Case Modelling 2 Day Course This course is presented in London on: 30-31 October, 17-18 May 2018, 29-30 November 2018 The Banking and Corporate Finance Training Specialist Background of the trainer

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract

More information

Max Registers, Counters and Monotone Circuits

Max Registers, Counters and Monotone Circuits James Aspnes 1 Hagit Attiya 2 Keren Censor 2 1 Yale 2 Technion Counters Model Collects Our goal: build a cheap counter for an asynchronous shared-memory system. Two operations: increment and read. Read

More information

Genetic Algorithm-based Electromagnetic Fault Injection

Genetic Algorithm-based Electromagnetic Fault Injection Genetic Algorithm-based Electromagnetic Fault Injection Antun Maldini Niels Samwel Stjepan Picek Lejla Batina Institute for Computing and Information Sciences Digital Security FDTC 2018 2018-09-13 Antun

More information

Simulation. Decision Models

Simulation. Decision Models Lecture 9 Decision Models Decision Models: Lecture 9 2 Simulation What is Monte Carlo simulation? A model that mimics the behavior of a (stochastic) system Mathematically described the system using a set

More information

Modeling Logic Gates with Delay- Part#1

Modeling Logic Gates with Delay- Part#1 Modelg Logic Gates with Delay- Part#1 by George Lungu - The previous series of tutorials treated logic gates ideally with considerg propagation delays, havg perfect edges at the put (negligible rise time

More information

While the story has been different in each case, fundamentally, we ve maintained:

While the story has been different in each case, fundamentally, we ve maintained: Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 22 November 20 2008 What the Hatfield and Milgrom paper really served to emphasize: everything we ve done so far in matching has really, fundamentally,

More information

A convenient analytical and visual technique of PERT and CPM prove extremely valuable in assisting the managers in managing the projects.

A convenient analytical and visual technique of PERT and CPM prove extremely valuable in assisting the managers in managing the projects. Introduction Any project involves planning, scheduling and controlling a number of interrelated activities with use of limited resources, namely, men, machines, materials, money and time. The projects

More information

Lecture Data Science

Lecture Data Science Web Science & Technologies University of Koblenz Landau, Germany Lecture Data Science Statistics Foundations JProf. Dr. Claudia Wagner Learning Goals How to describe sample data? What is mode/median/mean?

More information

Secure and Energy Efficient Physical Unclonable Functions

Secure and Energy Efficient Physical Unclonable Functions University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 Dissertations and Theses 2012 Secure and Energy Efficient Physical Unclonable Functions Sudheendra Srivathsa

More information

Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions.

Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Roel Maes, Ingrid Verbauwhede 1 Introduction The idea of using intrinsic random physical features to identify

More information

Non-Deterministic Search

Non-Deterministic Search Non-Deterministic Search MDP s 1 Non-Deterministic Search How do you plan (search) when your actions might fail? In general case, how do you plan, when the actions have multiple possible outcomes? 2 Example:

More information

Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture Nov , 2009

Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture Nov , 2009 Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture 21-22 Nov. 12-17, 2009 Outline: Investment Fluctuations in investment spending How firms make investment decisions The investment

More information

SIMULATION. The objectives of simulation:

SIMULATION. The objectives of simulation: Note: This lecture is best taken with Excel@ file LectureSIM.xls. Please pause the video and open Excel@ LectureSIM.xls, then continue. You may like to pause whenever you need to understand and repeat

More information

Chapter 7 A Multi-Market Approach to Multi-User Allocation

Chapter 7 A Multi-Market Approach to Multi-User Allocation 9 Chapter 7 A Multi-Market Approach to Multi-User Allocation A primary limitation of the spot market approach (described in chapter 6) for multi-user allocation is the inability to provide resource guarantees.

More information

CSEP 573: Artificial Intelligence

CSEP 573: Artificial Intelligence CSEP 573: Artificial Intelligence Markov Decision Processes (MDP)! Ali Farhadi Many slides over the course adapted from Luke Zettlemoyer, Dan Klein, Pieter Abbeel, Stuart Russell or Andrew Moore 1 Outline

More information

DECISION ANALYSIS: INTRODUCTION. Métodos Cuantitativos M. En C. Eduardo Bustos Farias 1

DECISION ANALYSIS: INTRODUCTION. Métodos Cuantitativos M. En C. Eduardo Bustos Farias 1 DECISION ANALYSIS: INTRODUCTION Cuantitativos M. En C. Eduardo Bustos Farias 1 Agenda Decision analysis in general Structuring decision problems Decision making under uncertainty - without probability

More information

Payday and Small-Dollar, High-Cost Installment Loans

Payday and Small-Dollar, High-Cost Installment Loans Payday and Small-Dollar, High-Cost Installment Loans NCSL August 4, 2015 Seattle, WA Nick Bourke www.pewtrusts.org/small-loans Pew Resources for Understanding the CFPB s Proposal www.pewtrusts.org/small-loans

More information

New Function Expected Scenario Outline. Triggered by abnormal disconnection from the TSE trading system

New Function Expected Scenario Outline. Triggered by abnormal disconnection from the TSE trading system Fundamental Principles for arrowhead Renewal Developed based on the fundamental principles of Improve Reliability, Improve Convenience and Improve Capabilities, the new, enhanced arrowhead cash equities

More information

TOSHIBA Field Effect Transistor Silicon N Channel MOS Type RFM07U7X

TOSHIBA Field Effect Transistor Silicon N Channel MOS Type RFM07U7X RFMUX TOSHIBA Field Effect Transistor Silicon N Channel MOS Type RFMUX VHF- and UHF-band Amplifier Applications (Note)The TOSHIBA products listed in this document are intended for high frequency Power

More information

Optimal Scheduling Policy Determination in HSDPA Networks

Optimal Scheduling Policy Determination in HSDPA Networks Optimal Scheduling Policy Determination in HSDPA Networks Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: {hussein, jtalim,

More information

TDT4255 Lecture 7: Hazards and exceptions

TDT4255 Lecture 7: Hazards and exceptions TDT4255 Lecture 7: Hazards and exceptions Donn Morrison Department of Computer Science 2 Outline Section 4.7: Data hazards: forwarding and stalling Section 4.8: Control hazards Section 4.9: Exceptions

More information

COMPARISION OF OFFSHORE REQUIREMENTS

COMPARISION OF OFFSHORE REQUIREMENTS Key to Table COMPARISION OF OFFSHORE REQUIREMENTS (Comparison based on GB Grid Code Issue 4 Revision 13 only and ENSTO - E RFG Internal Version dated 26 June 2012) (Note Does not include other Industry

More information

Designing with an Inverted-F PCB Antenna

Designing with an Inverted-F PCB Antenna Page 1 Application Note 5052 24 April 2008 Designing with an Inverted-F PCB Antenna For the EM250 and EM2 Platforms This document describes an Inverted-F PCB antenna designed by Ember for use with both

More information

FPS Briefcase. User Guide

FPS Briefcase. User Guide FPS Briefcase User Guide CCH Canadian Limited 2001 All rights reserved SOFTWARE LICENSE AGREEMENT The Financial Planning Solutions software (the Software), including FPS 2000, FPS Briefcase, ROI Analyst,

More information

Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs

Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs 704 IEICE TRANS. INF. & SYST., VOL.E82 D, NO.3 MARCH 1999 LETTER Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs Minoru TOMISAKA, Nonmember and Tomohiro YONEDA, Member SUMMARY In

More information

ICO Review: Solve.Care (CAN)

ICO Review: Solve.Care (CAN) ICO Review: Solve.Care (CAN) Platform for Decentralization of Healthcare February 13, 2018 What is Solve.Care? A decentralized platform for administration of healthcare and benefits programs. Their goal

More information

ESD.70J Engineering Economy

ESD.70J Engineering Economy ESD.70J Engineering Economy Fall 2010 Session One Xin Zhang xinzhang@mit.edu Prof. Richard de Neufville ardent@mit.edu http://ardent.mit.edu/real_options/rocse_excel_latest/excel_class.html ESD.70J Engineering

More information

Answers to June 11, 2012 Microeconomics Prelim

Answers to June 11, 2012 Microeconomics Prelim Answers to June, Microeconomics Prelim. Consider an economy with two consumers, and. Each consumer consumes only grapes and wine and can use grapes as an input to produce wine. Grapes used as input cannot

More information

Binary Options Trading Strategies How to Become a Successful Trader?

Binary Options Trading Strategies How to Become a Successful Trader? Binary Options Trading Strategies or How to Become a Successful Trader? Brought to You by: 1. Successful Binary Options Trading Strategy Successful binary options traders approach the market with three

More information

Combinational Vs Sequential Logic Combinational circuit. Sequential Circuit ? F. CS221: Digital Design Sequential Logic Design (Latch & FF)

Combinational Vs Sequential Logic Combinational circuit. Sequential Circuit ? F. CS221: Digital Design Sequential Logic Design (Latch & FF) /5/25 22: Digil Design equenil Logic Design (Lch & FF) A. hu Dep of omp. c. & Engg. Indin Insiue of Technology Guwhi Ouline ominionl Vs equenil Logic Design Design flip flop, h sores one i lch ilizing

More information

TB General description. 2. Features and benefits. 3. Applications. 4. Pinning information. 5. Ordering information

TB General description. 2. Features and benefits. 3. Applications. 4. Pinning information. 5. Ordering information 30 September 2016 Product data sheet 1. General description High voltage, high speed, planar passivated NPN power switching transistor in a SOT54 (TO92) plastic package intended for use in low power SMPS

More information

Warm Up Finitely Repeated Games Infinitely Repeated Games Bayesian Games. Repeated Games

Warm Up Finitely Repeated Games Infinitely Repeated Games Bayesian Games. Repeated Games Repeated Games Warm up: bargaining Suppose you and your Qatz.com partner have a falling-out. You agree set up two meetings to negotiate a way to split the value of your assets, which amount to $1 million

More information

The present value of a single payment of B dollars in year T when the interest rate is R is given by the formula:

The present value of a single payment of B dollars in year T when the interest rate is R is given by the formula: Notes on Present Value Page 1 Web Notes > Microeconomics HE MAXWELL SCHOOL SYACUSE UNIVESIY Here are the key equations for doing present value calculations. A single payment he present value of a single

More information

ICO Review: SelfKey (KEY)

ICO Review: SelfKey (KEY) ICO Review: SelfKey (KEY) Digital Identity Management System December 16, 2017 What is SelfKey? A decentralized identity system where users can instantly verify their identity to access financial services,

More information

Optimization 101. Dan dibartolomeo Webinar (from Boston) October 22, 2013

Optimization 101. Dan dibartolomeo Webinar (from Boston) October 22, 2013 Optimization 101 Dan dibartolomeo Webinar (from Boston) October 22, 2013 Outline of Today s Presentation The Mean-Variance Objective Function Optimization Methods, Strengths and Weaknesses Estimation Error

More information

13 Combinational Logic Devices

13 Combinational Logic Devices Prof. r. J. Reichardt Prof. r.. Schwarz F Elektrotechnik/Informatik ombinational ogic evices Purpose of combinational logic design: uilding larger, more sophisticated logic circuits by using adaptable

More information

Anne Bracy CS 3410 Computer Science Cornell University

Anne Bracy CS 3410 Computer Science Cornell University Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the

More information

MiCOM P443-6/P543-7/P841

MiCOM P443-6/P543-7/P841 MiCOM P443-6/P543-7/P841 Release Notes P443-6/P543-7/P841 Upgrade Platform Hardware Version: M, P Platform Software Version: 75, 65, 45 Publication Reference: P443-6/P543-7/P841-RNC1-TM-EN-1 ALSTOM 2013.

More information

Making Complex Decisions

Making Complex Decisions Ch. 17 p.1/29 Making Complex Decisions Chapter 17 Ch. 17 p.2/29 Outline Sequential decision problems Value iteration algorithm Policy iteration algorithm Ch. 17 p.3/29 A simple environment 3 +1 p=0.8 2

More information

The Benefits of a Rule Based Trading System

The Benefits of a Rule Based Trading System The Benefits of a Rule Based Trading System Contents Introduction Understanding The Truth The Ugly Truth About The System Sellers Plan Your Trades, Then Trade your Plan Finally 3 4 6 7 9 2 1 Introduction

More information

The Stackable Carry Trade

The Stackable Carry Trade The Stackable Carry Trade Introduction: The Carry Trade is a relatively popular strategy among Forex traders. The concept is to pair high yielding interest currencies against low interest currencies in

More information

Business borrowing is generally for two purposes; cashflow and equipment acquisition. The most common forms of borrowings are:

Business borrowing is generally for two purposes; cashflow and equipment acquisition. The most common forms of borrowings are: FINANCE Unless you or your business is in the enviable position of being cash rich, you will inevitably need to raise finance to purchase new equipment and expand. It is the same for all businesses and

More information

Homing with MEI Motion Card and ASIC-100

Homing with MEI Motion Card and ASIC-100 Homing with MEI Motion Card and ASIC-100 This application note explains a correct method of homing one or more axes using MEI motion controller with ASIC-100 software. Homing is a way to establish a reference

More information

Balance Sheet Strategies For Changing Rate Environments

Balance Sheet Strategies For Changing Rate Environments Balance Sheet Strategies For Changing Rate Environments Moss Adams 2017 Credit Union Conference Portland, OR June 22 nd, 2017 Ryan W. Hayhurst Managing Director ryan@gobaker.com 800 962 9468 Credit Union

More information

Hello Traders, Cutting Edge Forex Proudly Presents our finest work. Silicon Raptor

Hello Traders, Cutting Edge Forex Proudly Presents our finest work. Silicon Raptor Hello Traders, Cutting Edge Forex Proudly Presents our finest work. Silicon Raptor This brand new system works by waiting for small to medium pushes in the market that go one direction too far, too fast.

More information

The Ramsey Model. Lectures 11 to 14. Topics in Macroeconomics. November 10, 11, 24 & 25, 2008

The Ramsey Model. Lectures 11 to 14. Topics in Macroeconomics. November 10, 11, 24 & 25, 2008 The Ramsey Model Lectures 11 to 14 Topics in Macroeconomics November 10, 11, 24 & 25, 2008 Lecture 11, 12, 13 & 14 1/50 Topics in Macroeconomics The Ramsey Model: Introduction 2 Main Ingredients Neoclassical

More information

Temporal Abstraction in RL

Temporal Abstraction in RL Temporal Abstraction in RL How can an agent represent stochastic, closed-loop, temporally-extended courses of action? How can it act, learn, and plan using such representations? HAMs (Parr & Russell 1998;

More information

SmartCLOSE TM Q&A. DocMagic, Inc All rights reserved.

SmartCLOSE TM Q&A. DocMagic, Inc All rights reserved. Questions When will we have a chance to test this software? Are there additional fees to lenders (and/or attorneys) for using the Collaboration option? Are there any costs to Title Companies to use the

More information

Logic Selection Guide

Logic Selection Guide Logic Selection Guide June 000 Product Overview The availability of logic products is vast and dynamic. New family offerings are introduced almost every year, even as many manufacturers are reducing their

More information

Process Optimization Level I (Introduction)

Process Optimization Level I (Introduction) Process Optimization Level I (Introduction) 8 Hours A hands-on, interactive introduction to Business Process Optimization Focused on the most effective tools & concepts from the many process improvement

More information

Strategy and Settings for Tradonator nextgen!

Strategy and Settings for Tradonator nextgen! Strategy and Settings for Tradonator nextgen! Introduction Tradonator nextgen! is the successor of the Tradonator Cash Pro Expert Advisor, an automated trading system. On any timeframe two trading pools

More information

Statutory Provisions. LITTLE a VS BIG A. Code Sec. 263(a) Code Sec. 263A. Code Sec. 263A(f) Code Sec. 460(c) INVENTORIES

Statutory Provisions. LITTLE a VS BIG A. Code Sec. 263(a) Code Sec. 263A. Code Sec. 263A(f) Code Sec. 460(c) INVENTORIES INVENTORIES Accounting 580T Lectures 10 and 11 Gertzman: Chapters 6 and 7 Robert A. Scharlach Statutory Provisions Code Sec. 263(a) Code Sec. 263A Code Sec. 263A(f) Code Sec. 460(c) LITTLE a VS BIG A Sec.

More information

In Chapter 2, a notional amortization schedule was created that provided a basis

In Chapter 2, a notional amortization schedule was created that provided a basis CHAPTER 3 Prepayments In Chapter 2, a notional amortization schedule was created that provided a basis for cash flowing into a transaction. This cash flow assumes that every loan in the pool will make

More information

Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis

Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis 1, 2 1 3, 4 1 3 1 Monte Carlo g(x) g(x) g(x) g(x) g(x) / 6-24 SRAM Monte Carlo 2 5 Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis Shiho

More information

Why is this indicator so profitable?

Why is this indicator so profitable? Why is this indicator so profitable? This indicator is based on sound trading logic. It exploits the always recurring behavior of the smart money (in forex the mega banks). The smart money produces double

More information

3M Molded Assembly 2 mm x 2 mm 2M Series

3M Molded Assembly 2 mm x 2 mm 2M Series M Molded Assembly 2 mm x 2 mm 2M Series Available in multiple sizes Sockets mate with standard 2 mm 2 mm headers and plugs Molded-in strain relief See Regulatory Information Appendix (RIA) for chemical

More information

Rate Methodology in a FFS HCBS Structure

Rate Methodology in a FFS HCBS Structure Rate Methodology in a FFS HCBS Structure Division of Long Term Services and Supports Disabled and Elderly Health Programs Group Center for Medicaid and CHIP Services Training Objectives This training consists

More information