Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann

Size: px
Start display at page:

Download "Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann"

Transcription

1 Chapter 7 Registers & Register Transfers J. J. Shann J.J. Shann

2 Chapter Overview 7-1 Registers and Load Enable 7-2 Register Transfers 7-3 Register Transfer Operations 7-4 A Note for VHDL and Verilog Users Only 7-5 Microoperations 7-6 Microoperatrions on a Single Register 7-7 Register Cell Design 7-8 Multiplexer and Bus-Based Transfer for Multiple Registers 7-9 Serial Transfer and Microoperations 7-1 HDL Representation for Shift Registes and Counters VHDL 7-11 HDL Representation for Shift Registes and Counters Verilog 7-12 Chapter Summary J.J. Shann 7-2

3 Part I: Registers and Counters 7-1 Registers and Load Enable 7-6 Microoperatrions on a Single Register (Shift registers, Ripple counter, Synchronous binary counters, other counters) Part II: Register Transfers 7-2 Register Transfers 7-3 Register Transfer Operations 7-5 Microoperations 7-7 Register Cell Design 7-6 Microoperatrions on a Single Register (Multiplexer-Based Transfers) 7-8 Multiplexer and Bus-Based Transfer for Multiple Registers 7-9 Serial Transfer and Microoperations 7-12 Chapter Summary J.J. Shann 7-3

4 Part I Registers and Counters J.J. Shann

5 Clocked seq ckt: sync seq ckt consists of a group of flip-flops and combinational gates connected to form a feedback path. Flip-flops + Combinational gates (essential) (optional) Register: consists of a group of flip-flops capable of storing binary information and gates that determine how the information is transferred into the register. Counter: is essentially a register that goes through a predetermined sequence of states. J.J. Shann 7-5

6 Lecture Contents A. Simplest register ( 7-1) B. Register with parallel load ( 7-1) C. Shift registers ( 7-6) D. Ripple counter ( 7-6) E. Synchronous binary counters ( 7-6) F. Other counters ( 7-6) J.J. Shann 7-6

7 A. Simplest Register ( 7-1) Simplest register: consists of only flip-flops w/o any gates. E.g.: a 4-bit register with asynchronous clear input J.J. Shann 7-7

8 B. Register w/ Parallel Load ( 7-1) Load Approach 1: Load control input through the C inputs of the f-fs clock gating Approach 2: Load control input through the D inputs of the f-fs J.J. Shann 7-8

9 Approach 1: Load control input through the C inputs of the f-fs clock gating prevent the clock from reaching the clock input to the ckt if the contents of the reg are to be left unchanged C inputs = Load + Clock * Inserting gates in the clock pulse path produces different propagation delays b/t clock and the inputs of f-fs w/ and w/o clock gating. clock skew J.J. Shann 7-9

10 Approach 2: Load control input through the D inputs of the f-fs D i = Load I i + Load i (Load) E.g.: 4-bit register w/ parallel load J.J. Shann 7-1

11 C. Shift Registers ( 7-6) Shift register: a register capable of shifting its binary information in one or both direction Simplest shift register: unidirectional J.J. Shann 7-11

12 Shift Register w/ Parallel Load Shift register w/ parallel load: Functional table: D i = Shift Load i + Shift Load Ii + Shift i 1 Clock J.J. Shann 7-12

13 E.g.: 4-bit shift register w/ parallel load J.J. Shann 7-13

14 Bidirectional Shift Register Bidirectional shift register direction = shl = 1 shr direction SI of shr SO of shl i + 1 Flip-Flops i i 1 SO of shr SI of shl CLK D i = direction A i+1 + direction A i 1 J.J. Shann 7-14

15 Bidirectional Shift Reg w/ Parallel Load Bidirectional shift register w/ parallel load: Mode control Register S 1 S operation No change 1 Shift down 1 Shift up 1 1 Parallel load D i = S 1 S i + S 1 S i-1 + S 1 S i+1 + S 1 S I i J.J. Shann 7-15

16 D. Ripple Counters ( 7-6) Counter: a register that goes through a prescribed sequence of states upon the application of input pulses: Input pulses: may be clock pulses or originate from some external source Timing: may occur at regular or irregular intervals of time The sequence of states: may follow the binary number sequence ( Binary counter) or any other sequence of states J.J. Shann 7-16

17 Categories of counters: 1. Ripple counters: (D) The flip-flop output transition serves as a source for triggering other flip-flops. The C input of some or all flip-flops are triggered not by the common clock pulses. (not synchronous) 2. Synchronous counters: (E) The C inputs of all flip-flops receive the common clock. * T or JK flip-flops J.J. Shann 7-17

18 Binary Ripple Counter Binary count-up counter: E.g.: 4-bit binary count-up ripple counter J.J. Shann 7-18

19 Observations: FF :C = Clock pulse D = FF 1 :C 1 = ( ) ( ) D 1 = 1 FF 2 :C 2 = 1 ( ) 1 ( ) D 2 = 2 FF 3 :C 3 = 2 ( ) 2 ( ) D 3 = J.J. Shann 7-19

20 1 2 3 J.J. Shann 7-2

21 * Problem of ripple counter: Accumulation of propagation delay E.g.: 2-bit binary count-up ripple counter 1 CP J.J. Shann 7-21

22 Binary count-down counter: E.g.: 4-bit binary count-down ripple counter Downward Counting Sequence * Modify the figure in p.7-19: Connect the true output of each f-f to the C input of the next f-f. J.J. Shann 7-22

23 Summary: are asynchronous ckts Adv.: simple hardware Disadv.: become ckt w/ delay dependence and unreliable op large ripple counters can be slow ckts the length of time required for the ripple to finish J.J. Shann 7-23

24 E. Synchronous Counters ( 7-6) Sync counter: A common clock triggers all flip-flops simultaneously. Symbol: Design procedure: We can apply the same procedure of sync seq ckts. Sync counter is simpler than general sync seq ckts. No need to go through a sync seq logic design process. J.J. Shann 7-24

25 Example E.g.: 4-bit sync count-up binary counter w/ count enable line Approach 1: design procedure of sync seq ckt (Ch6) Present state Nest state EN = EN = Output CO 1 D EN = + EN = EN D1 = 1 ( EN) D2 = 2 ( 1 EN) D3 = 3 ( 2 1 EN) CO = CO: is used to extend the counter to more stages J.J. Shann 7-25

26 J.J. Shann 7-26 Approach 2: observation ) ( 1 1 EN D = ) ( EN D = ) ( EN D = CO = EN EN D = + = EN

27 Approach 3: an incrementer (Ch5) + D f-fs D 3 D 2 D 1 D = EN D = EN D1 = 1 ( EN ) D2 = 2 ( 1 EN) D3 = 3 ( 2 1 EN) CO = J.J. Shann 7-27

28 Alternative Designs for Binary Counters Two alternative designs for binary counters: Serial counter: serial gating Parallel counter: parallel gating * analogous to the ripple carry adder C 1 C 2 * analogous to the carry lookahead adder C 3 J.J. Shann 7-28

29 Binary Counter by Using JK Flip-Flops E.g.: 4-bit count-up binary counter w/ JK f-fs Binary count sequence: 3-bit A 2 A 1 A J.J. Shann 7-29

30 A 2 A 1 A J = K = EN J 1 = K 1 = EN A J 2 = K 2 = EN A 1 A J 3 = K 3 = EN A 2 A 1 A J.J. Shann 7-3

31 Up-Down Binary Counter Up-down binary counter: E.g.: 4-bit up-down binary counter J.J. Shann 7-31

32 J.J. Shann 7-32 EN D = ) ) (( 1 1 EN S S D + = ) ) (( EN S S D + = ) ) (( EN S S D + = S = up-counting 1 down-counting Up-down counter:

33 Binary Counter w/ Parallel Load E.g.: 4-bit count-up binary counter w/ parallel load Function table: Load Count I 3 I 2 I 1 I D i = Load Count i + Load Count ( i i-1 ) + Load I i J.J. Shann 7-33

34 E.g.: 4-bit count-up binary counter w/ parallel load 1 J.J. Shann 7-34

35 E.g.: 4-bit count-up binary counter w/ parallel load 1 1 D ( ) J.J. Shann 7-35

36 Generating Other Count Sequences Generate any count sequence: E.g.: design a BCD counter by using a counter w/ parallel load & async clear J.J. Shann 7-36

37 J.J. Shann 7-37

38 F. Other Counters ( 7-6) Counters: can be designed to generate any desired sequence of states Binary counter (D, E) BCD counter Divide-by-N counter: modulo-n counter a counter that goes through a repeated sequence of N states The sequence may follow the binary count or may be any other arbitrary sequence. J.J. Shann 7-38

39 BCD Counter State diagram & Count sequence: J.J. Shann 7-39

40 Synchronous BCD Counter Synchronous BCD counter: E.g.: 4-bit sync BCD counter w/ D-type f-f D 1 = 1 D D 2 = = D = ( + 4) Y = 1 8 J.J. Shann 7-4

41 E.g.: 4-bit sync BCD counter w/ T-type f-f T 1 = 1, T 2 = 8 1, T 4 = 2 1, T 8 = , y = 8 1 J.J. Shann 7-41

42 Three-decade BCD counter: J.J. Shann 7-42

43 Counter w/ Unused States n flip-flops 2 n binary states Unused states: states that are not used in specifying the sequential ckt may be treated as don t-care conditions or may be assigned specific next states Self-correcting counter: Ensure that when a ckt enter one of its unused states, it eventually goes into one of the valid states after one or more clock pulses so it can resume normal operation. Analyze the ckt to determine the next state from an unused state after it is designed. J.J. Shann 7-43

44 Example: The simplified f-f input eqs: D A = A B D B = C D C = B C Two unused states: 11 & 111 J.J. Shann 7-44

45 The logic diagram & state diagram of the ckt: Analysis * Self-correcting! J.J. Shann 7-45

46 7-12 Chapter Summary Registers Simplest register ( 7-1) Register with parallel load ( 7-1) Shift registers ( 7-6) Counters Ripple counter ( 7-6) Synchronous binary counters ( 7-6) Other counters ( 7-6) J.J. Shann 7-46

Lecture 20: Sequential Circuits. Sequencing

Lecture 20: Sequential Circuits. Sequencing Lecture 20: Sequential Circuits Sequencing Elements Simple /FF Timing efinitions Source: Ch 7 (W&H) Sequencing Use flip-flops to delay fast tokens so they move through exactly one stage each cycle. Inevitably

More information

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015 /4/25 C2: Digital Design http://jatinga.iitg.ernet.in/~asahu/cs22 FSM Optimization Outline FSM : State minimization Row Matching Method, Implication chart method, FSM Partitioning FSM Encoding: Random,

More information

Finite state machines (cont d)

Finite state machines (cont d) Finite state machines (cont d)! Another type of shift register " Linear-feedback shift register (LFSR)! Used to generate pseudo-random numbers! Some FSM examples Autumn 2014 CSE390C - VIII - Finite State

More information

Sequential Gates. Gate Level Design. Young Won Lim 3/15/16

Sequential Gates. Gate Level Design. Young Won Lim 3/15/16 equential Gates Gate Level esign Copyright (c) 2011-2016 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free ocumentation License, Version

More information

Derivation of State Graphs and Tables UNIT 14 DERIVATION OF STATE GRAPHS AND TABLES. Designing a Sequential Circuit. Sequence Detectors

Derivation of State Graphs and Tables UNIT 14 DERIVATION OF STATE GRAPHS AND TABLES. Designing a Sequential Circuit. Sequence Detectors Derivation of State Graphs and Tables 2 Contents Case studies: sequence detectors Guidelines for construction of graphs Serial data code conversion Alphanumeric graph notation Reading Unit 4 Basic unit

More information

CS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I

CS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I CS43 Design and Analysis of Algorithms Lecture 4: Amortized Analysis I About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an

More information

About this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method.

About this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method. About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an operation Introduce amortized cost of an operation Three Methods for the

More information

ITM1010 Computer and Communication Technologies

ITM1010 Computer and Communication Technologies ITM omputer and ommunication Technologies Lecture #5 Part I: Introduction to omputer Technologies K-Map, ombination and Sequential Logic ircuits ITM 計算機與通訊技術 2 Product Product-Of Of-Sum onfiguration Sum

More information

CS473-Algorithms I. Lecture 12. Amortized Analysis. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 12. Amortized Analysis. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 12 Amortized Analysis 1 Amortized Analysis Key point: The time required to perform a sequence of data structure operations is averaged over all operations performed Amortized

More information

How Computers Work Lecture 12

How Computers Work Lecture 12 How Computers Work Lecture 12 A Common Chore of College Life Introduction to Pipelining How Computers Work Lecture 12 Page 1 How Computers Work Lecture 12 Page 2 Page 1 1 Propagation Times Doing 1 Load

More information

COMP251: Amortized Analysis

COMP251: Amortized Analysis COMP251: Amortized Analysis Jérôme Waldispühl School of Computer Science McGill University Based on (Cormen et al., 2009) T n = 2 % T n 5 + n( What is the height of the recursion tree? log ( n log, n log

More information

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-

More information

Lecture 8: Skew Tolerant Domino Clocking

Lecture 8: Skew Tolerant Domino Clocking Lecture 8: Skew Tolerant Domino Clocking Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2001 by Mark Horowitz (Original Slides from David Harris) 1 Introduction Domino

More information

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues)

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2007 by Mark Horowitz w/ material from David Harris 1

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application

More information

SCHEDULE CREATION AND ANALYSIS. 1 Powered by POeT Solvers Limited

SCHEDULE CREATION AND ANALYSIS. 1   Powered by POeT Solvers Limited SCHEDULE CREATION AND ANALYSIS 1 www.pmtutor.org Powered by POeT Solvers Limited While building the project schedule, we need to consider all risk factors, assumptions and constraints imposed on the project

More information

THE KEYNESIAN MODEL IN THE SHORT AND LONG RUN

THE KEYNESIAN MODEL IN THE SHORT AND LONG RUN Lecture: THE KENESIAN MODEL IN THE SHORT AND LONG RUN In the short run actual GDP,, may be lower or higher or equal to full-employment GDP,. The aim of the Keynesian model in the short run is to explain

More information

Max Registers, Counters and Monotone Circuits

Max Registers, Counters and Monotone Circuits James Aspnes 1 Hagit Attiya 2 Keren Censor 2 1 Yale 2 Technion Counters Model Collects Our goal: build a cheap counter for an asynchronous shared-memory system. Two operations: increment and read. Read

More information

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 Lecture 17 & 18: Markov Decision Processes Oct 12 13, 2010 A subset of Lecture 9 slides from Dan Klein UC Berkeley Many slides over the course

More information

TDT4255 Lecture 7: Hazards and exceptions

TDT4255 Lecture 7: Hazards and exceptions TDT4255 Lecture 7: Hazards and exceptions Donn Morrison Department of Computer Science 2 Outline Section 4.7: Data hazards: forwarding and stalling Section 4.8: Control hazards Section 4.9: Exceptions

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the reward function Must (learn to) act so as to maximize expected rewards Grid World The agent

More information

Project Management -- Developing the Project Plan

Project Management -- Developing the Project Plan Project Management -- Developing the Project Plan Dr. Tai-Yue Wang Department of Industrial and Information Management National Cheng Kung University Tainan, TAIWAN, ROC 1 Where We Are Now 6 2 Developing

More information

(C). D-FF P:2 U3 D:4 U1 Q:5 U5 CLK:1 C:3. U2 100k P:2 U1 SN7474 Q:3 U4 0 L U5 1M CLK:1 U3 5 H CLK L H L H. L u 5.00u 7.50u 10.

(C). D-FF P:2 U3 D:4 U1 Q:5 U5 CLK:1 C:3. U2 100k P:2 U1 SN7474 Q:3 U4 0 L U5 1M CLK:1 U3 5 H CLK L H L H. L u 5.00u 7.50u 10. 1 15. 1. (register),. FFs, FF bit. n-bits n-ffs n-bits. FFs,. FFs. FFs. MSI. FFs. JK FFs. 2. -FF -FF 1 2. -FF. -FF,. :2 U5 1M K:1 U2 100k U4 0 U3 5 U1 SN7474 :3 1. -FF. T K 0.00 2.50u 5.00u 7.50u 10.00u

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract

More information

9. DIGIPATH Digital Service II (DDSII) 9.1 General

9. DIGIPATH Digital Service II (DDSII) 9.1 General Page 1 9.1 General Rates and charges for services explained herein are contained in Part M, Section 3. Service charges referred to herein are explained in Part A, Section 3 and contained in Part M, Section

More information

Real Estate. Refinancing

Real Estate. Refinancing Introduction This Solutions Handbook has been designed to supplement the HP-12C Owner's Handbook by providing a variety of applications in the financial area. Programs and/or step-by-step keystroke procedures

More information

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form

More information

A New Redundancy Strategy for High-Availability Power Systems

A New Redundancy Strategy for High-Availability Power Systems Kevin Covi IBM STG High-End Server Development A New Redundancy Strategy for High-Availability Power Systems Outline RAS Philosophy Review Power 6 Traditional approach Power 7 Hybrid approach Load lines

More information

Lecture 7. Analysis of algorithms: Amortized Analysis. January Lecture 7

Lecture 7. Analysis of algorithms: Amortized Analysis. January Lecture 7 Analysis of algorithms: Amortized Analysis January 2014 What is amortized analysis? Amortized analysis: set of techniques (Aggregate method, Accounting method, Potential method) for proving upper (worst-case)

More information

Department of Finance and Risk Engineering, NYU-Polytechnic Institute, Brooklyn, NY

Department of Finance and Risk Engineering, NYU-Polytechnic Institute, Brooklyn, NY Schizophrenic Representative Investors Philip Z. Maymin Department of Finance and Risk Engineering, NYU-Polytechnic Institute, Brooklyn, NY Philip Z. Maymin Department of Finance and Risk Engineering NYU-Polytechnic

More information

On the computational complexity of spiking neural P systems

On the computational complexity of spiking neural P systems On the computational complexity of spiking neural P systems Turlough Neary Boole Centre for Research in Informatics, University College Cork, Ireland. tneary@cs.may.ie Abstract. It is shown that there

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

Data and Process Modelling

Data and Process Modelling Data and Process Modelling Lab10. Quantitative Process Analysis Marco Montali KRDB Research Centre for Knowledge and Data Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016 Marco

More information

Unit 6: Amortized Analysis

Unit 6: Amortized Analysis : Amortized Analysis Course contents: Aggregate method Accounting method Potential method Reading: Chapter 17 Y.-W. Chang 1 Amortized Analysis Why Amortized Analysis? Find a tight bound of a sequence of

More information

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES WIKTOR JAKUBIUK, KESHAV PURANMALKA 1. Introduction Dijkstra s algorithm solves the single-sourced shorest path problem on a

More information

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to

More information

A convenient analytical and visual technique of PERT and CPM prove extremely valuable in assisting the managers in managing the projects.

A convenient analytical and visual technique of PERT and CPM prove extremely valuable in assisting the managers in managing the projects. Introduction Any project involves planning, scheduling and controlling a number of interrelated activities with use of limited resources, namely, men, machines, materials, money and time. The projects

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 15 Adaptive Huffman Coding Part I Huffman code are optimal for a

More information

CSE 473: Artificial Intelligence

CSE 473: Artificial Intelligence CSE 473: Artificial Intelligence Markov Decision Processes (MDPs) Luke Zettlemoyer Many slides over the course adapted from Dan Klein, Stuart Russell or Andrew Moore 1 Announcements PS2 online now Due

More information

The Critical Path Method

The Critical Path Method The Critical Path Method Presented by Antonio Prensa, MBA, PMP, CCP, CSTE for Project Management Institute Puerto Rico Chapter June 2, 22 San Juan, Puerto Rico "I believe that this nation should commit

More information

Delay Budgeting in Sequential Circuit with Application on FPGA Placement

Delay Budgeting in Sequential Circuit with Application on FPGA Placement 13.2 Delay Budgeting in Sequential Circuit with Application on FPGA Placement Chao-Yang Yeh and Malgorzata Marek-Sadowska Department of Electrical and Computer Engineering, University of California, Santa

More information

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns

More information

A Heuristic Method for Statistical Digital Circuit Sizing

A Heuristic Method for Statistical Digital Circuit Sizing A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance

More information

Thunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University

Thunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass and Elaine Shi Cornell Tech & Cornell University State-machine replication (a.k.a. linearly ordered log, consensus, blockchain)

More information

Frequency Distributions

Frequency Distributions Frequency Distributions January 8, 2018 Contents Frequency histograms Relative Frequency Histograms Cumulative Frequency Graph Frequency Histograms in R Using the Cumulative Frequency Graph to Estimate

More information

TEPZZ 858Z 5A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2015/15

TEPZZ 858Z 5A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2015/15 (19) TEPZZ 88Z A_T (11) EP 2 88 02 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 08.04. Bulletin / (1) Int Cl.: G06Q /00 (12.01) (21) Application number: 13638.6 (22) Date of filing: 01..13

More information

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the

More information

Your investment mix should always reflect your financial objectives,

Your investment mix should always reflect your financial objectives, # 68 291 Allocate Assets at the Current Stage of Your Life By Garry Good, MBA Your investment mix should always reflect your financial objectives, time horizon, and risk tolerance. A well-designed portfolio

More information

Solutions - Final Exam (December 7:30 am) Clarity is very important! Show your procedure!

Solutions - Final Exam (December 7:30 am) Clarity is very important! Show your procedure! DPARTMNT OF LCTRICAL AND COMPUTR NGINRING, TH UNIVRSITY OF NW MXICO C-238L: Computer Logic Deign Fall 23 Solution - Final am (December th @ 7:3 am) Clarity i very important! Show your procedure! PROBLM

More information

Chapter 7 A Multi-Market Approach to Multi-User Allocation

Chapter 7 A Multi-Market Approach to Multi-User Allocation 9 Chapter 7 A Multi-Market Approach to Multi-User Allocation A primary limitation of the spot market approach (described in chapter 6) for multi-user allocation is the inability to provide resource guarantees.

More information

CS 188: Artificial Intelligence Spring Announcements

CS 188: Artificial Intelligence Spring Announcements CS 188: Artificial Intelligence Spring 2011 Lecture 9: MDPs 2/16/2011 Pieter Abbeel UC Berkeley Many slides over the course adapted from either Dan Klein, Stuart Russell or Andrew Moore 1 Announcements

More information

Statistical Static Timing Analysis: How simple can we get?

Statistical Static Timing Analysis: How simple can we get? Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern

More information

Project Management. Project Mangement. ( Notes ) For Private Circulation Only. Prof. : A.A. Attarwala.

Project Management. Project Mangement. ( Notes ) For Private Circulation Only. Prof. : A.A. Attarwala. Project Mangement ( Notes ) For Private Circulation Only. Prof. : A.A. Attarwala. Page 1 of 380 26/4/2008 Syllabus 1. Total Project Management Concept, relationship with other function and other organizations,

More information

MiCOM P443-6/P543-7/P841

MiCOM P443-6/P543-7/P841 MiCOM P443-6/P543-7/P841 Release Notes P443-6/P543-7/P841 Upgrade Platform Hardware Version: M, P Platform Software Version: 75, 65, 45 Publication Reference: P443-6/P543-7/P841-RNC1-TM-EN-1 ALSTOM 2013.

More information

Tutorial 3: Working with Formulas and Functions

Tutorial 3: Working with Formulas and Functions Tutorial 3: Working with Formulas and Functions Microsoft Excel 2010 Objectives Copy formulas Build formulas containing relative, absolute, and mixed references Review function syntax Insert a function

More information

Non-Deterministic Search

Non-Deterministic Search Non-Deterministic Search MDP s 1 Non-Deterministic Search How do you plan (search) when your actions might fail? In general case, how do you plan, when the actions have multiple possible outcomes? 2 Example:

More information

Lecture 22. Aggregate demand and aggregate supply

Lecture 22. Aggregate demand and aggregate supply Lecture 22 Aggregate demand and aggregate supply By the end of this lecture, you should understand: three key facts about short-run economic fluctuations how the economy in the short run differs from the

More information

8.6 FORMULATION OF PROJECT REPORT. 160 // Management and Entrepreneurship

8.6 FORMULATION OF PROJECT REPORT. 160 // Management and Entrepreneurship 160 // Management and Entrepreneurship (9) Raw material: List of raw material required by quality and quantity, sources of procurement, cost of raw material, tie-up arrangements, if any for procurement

More information

CS 188: Artificial Intelligence Fall 2011

CS 188: Artificial Intelligence Fall 2011 CS 188: Artificial Intelligence Fall 2011 Lecture 9: MDPs 9/22/2011 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 2 Grid World The agent lives in

More information

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add; CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the

More information

The Cagan Model. Lecture 15 by John Kennes March 25

The Cagan Model. Lecture 15 by John Kennes March 25 The Cagan Model Lecture 15 by John Kennes March 25 The Cagan Model Let M denote a country s money supply and P its price level. Higher expected inflation lowers the demand for real balances M/P by raising

More information

Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems

Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses Dissertations and Theses 2016 Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions

More information

Instruction Selection: Preliminaries. Comp 412

Instruction Selection: Preliminaries. Comp 412 COMP 412 FALL 2018 Instruction Selection: Preliminaries Comp 412 source code IR Front End Optimizer Back End IR target code Copyright 2018, Keith D. Cooper & Linda Torczon, all rights reserved. Students

More information

Project planning and creating a WBS

Project planning and creating a WBS 37E01500 Project Management and Consulting Practice Project planning and creating a WBS Matti Rossi Lecture 3, Tue 28.2.2017 Learning objectives Describe the project time management planning tasks, and

More information

13 Combinational Logic Devices

13 Combinational Logic Devices Prof. r. J. Reichardt Prof. r.. Schwarz F Elektrotechnik/Informatik ombinational ogic evices Purpose of combinational logic design: uilding larger, more sophisticated logic circuits by using adaptable

More information

GRA 6639 Topics in Macroeconomics

GRA 6639 Topics in Macroeconomics Lecture 9 Spring 2012 An Intertemporal Approach to the Current Account Drago Bergholt (Drago.Bergholt@bi.no) Department of Economics INTRODUCTION Our goals for these two lectures (9 & 11): - Establish

More information

Realization of MUX-Based PUF for low power applications

Realization of MUX-Based PUF for low power applications IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 6, Ver. IV (Nov.-Dec.2016), PP 33-43 www.iosrjournals.org Realization of MUX-Based

More information

Chapter 4. Determination of Income and Employment 4.1 AGGREGATE DEMAND AND ITS COMPONENTS

Chapter 4. Determination of Income and Employment 4.1 AGGREGATE DEMAND AND ITS COMPONENTS Determination of Income and Employment Chapter 4 We have so far talked about the national income, price level, rate of interest etc. in an ad hoc manner without investigating the forces that govern their

More information

SECURITIES INDUSTRY AUTOMATION CORPORATION CQS

SECURITIES INDUSTRY AUTOMATION CORPORATION CQS SECURITIES INDUSTRY AUTOMATION CORPORATION CQS CONSOLIDATED QUOTATION SYSTEM May 8, 2018 Version 1.7 CONTENTS VERSION HISTORY... 4 1.0 INTRODUCTION... 5 1.1 BACKGROUND... 5 1.2 DUAL SITE REDUNDANCY...

More information

Communications Point Data Base for Serial and Ethernet Communications Protocol DNP3

Communications Point Data Base for Serial and Ethernet Communications Protocol DNP3 Switchgear Technical Data TD280015EN Effective July 2015 Supersedes R280-90-18 8/2012 Communications Point Data Base for Serial and Ethernet Communications Protocol DNP3 For use with Eaton s Cooper Power

More information

DC Program and Project Managers Meeting #2

DC Program and Project Managers Meeting #2 + Trevor Lowing Trevor.Lowing@gmail.com DC Program and Project Managers Meeting #2 Session 1: Planning projects with MS Project Session 2: Workshop: Generating Reports with MS Project and Visual Basic

More information

GPE engineering project management. Project Management in an Engineering Context

GPE engineering project management. Project Management in an Engineering Context GPE engineering project management Project Management in an Engineering Context Network diagrams in context PM SOW CHARTER SCOPE DEFINITION WBS circulation, negotiation, translation WBS WP à activities

More information

MS-E2114 Investment Science Lecture 3: Term structure of interest rates

MS-E2114 Investment Science Lecture 3: Term structure of interest rates MS-E2114 Investment Science Lecture 3: Term structure of interest rates A. Salo, T. Seeve Systems Analysis Laboratory Department of System Analysis and Mathematics Aalto University, School of Science Overview

More information

MDPs: Bellman Equations, Value Iteration

MDPs: Bellman Equations, Value Iteration MDPs: Bellman Equations, Value Iteration Sutton & Barto Ch 4 (Cf. AIMA Ch 17, Section 2-3) Adapted from slides kindly shared by Stuart Russell Sutton & Barto Ch 4 (Cf. AIMA Ch 17, Section 2-3) 1 Appreciations

More information

MnDOT use of Calendars in Primavera P6

MnDOT use of Calendars in Primavera P6 MnDOT Project Management Office Presents: MnDOT use of Calendars in Primavera P6 Presenter: Jonathan McNatty, PSP Senior Schedule Consultant DRMcNatty & Associates, Inc. Housekeeping Items Lines will be

More information

Mobilizing Blockchain Technology for the Automotive Industry Duncan Westland Ernst & Young. #EY_Automotive

Mobilizing Blockchain Technology for the Automotive Industry Duncan Westland Ernst & Young. #EY_Automotive Mobilizing Blockchain Technology for the Automotive Industry Duncan Westland Ernst & Young #EY_Automotive Agenda Blockchain 101: What They Do, How They Work Blockchain Applications: Operations Ecosystems

More information

edunepal_info

edunepal_info facebook.com/edunepal.info @ edunepal_info TRIBHUVAN UNIVERSITY 1.Brief Answer Questions: [10 1=10] i. Write the characteristic equation of SR flip flop. ii. BIM/Fourth Semester/ITC 220: Computer Organization

More information

Final: Total 200 points (3-hour exam)

Final: Total 200 points (3-hour exam) Final: Total 200 points (3-hour exam) [Engineering Economics] IRR Calculation [15 points] One alternative for improving a company s operations is to do nothing for the next 2 years and then spend $10,000

More information

Artificial Neural Networks Lecture Notes

Artificial Neural Networks Lecture Notes Artificial Neural Networks Lecture Notes Part 10 About this file: This is the printer-friendly version of the file "lecture10.htm". In case the page is not properly displayed, use IE 5 or higher. Since

More information

What Determines Aggregate Demand?

What Determines Aggregate Demand? What Determines Aggregate Demand? AS-AD model: emphasis on aggregate supply Now we are going to study a model that sheds more light on aggregate demand We will see how the two models are related Keynesian

More information

SMT and POR beat Counter Abstraction

SMT and POR beat Counter Abstraction SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64

More information

Batch Process Oracle FLEXCUBE Investor Servicing Release 12.0 [April] [2012] Oracle Part Number E

Batch Process Oracle FLEXCUBE Investor Servicing Release 12.0 [April] [2012] Oracle Part Number E Batch Process Oracle FLEXCUBE Investor Servicing Release 12.0 [April] [2012] Oracle Part Number E51528-01 Table of Contents Batch Process 1. ABOUT THIS MANUAL... 1-1 1.1 INTRODUCTION... 1-1 1.2 RELATED

More information

New Statistics of BTS Panel

New Statistics of BTS Panel THIRD JOINT EUROPEAN COMMISSION OECD WORKSHOP ON INTERNATIONAL DEVELOPMENT OF BUSINESS AND CONSUMER TENDENCY SURVEYS BRUSSELS 12 13 NOVEMBER 27 New Statistics of BTS Panel Serguey TSUKHLO Head, Business

More information

Steve Keen s Dynamic Model of the economy.

Steve Keen s Dynamic Model of the economy. Steve Keen s Dynamic Model of the economy. Introduction This article is a non-mathematical description of the dynamic economic modeling methods developed by Steve Keen. In a number of papers and articles

More information

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at

More information

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role

More information

Market Operator Generator Offer Procedure

Market Operator Generator Offer Procedure Market Operator Generator Offer Procedure Content 1. Purpose... 1 2. Scope... 1 3. Roles and Responsibilities... 2 4. Definitions... 2 5. Principles... 3 6. References... 4 7. Attachments... 4 8. Records...

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Defining Issues. Revenue from Contracts with Customers. June 2014, No

Defining Issues. Revenue from Contracts with Customers. June 2014, No Defining Issues June 2014, No. 14-25 Revenue from Contracts with Customers On May 28, 2014, the FASB and the IASB issued a new accounting standard that is intended to improve and converge the financial

More information

MONTE CARLO EXTENSIONS

MONTE CARLO EXTENSIONS MONTE CARLO EXTENSIONS School of Mathematics 2013 OUTLINE 1 REVIEW OUTLINE 1 REVIEW 2 EXTENSION TO MONTE CARLO OUTLINE 1 REVIEW 2 EXTENSION TO MONTE CARLO 3 SUMMARY MONTE CARLO SO FAR... Simple to program

More information

Taiwan Futures Exchange. Market Data Transmission Manual

Taiwan Futures Exchange. Market Data Transmission Manual Taiwan Futures Exchange Market Data Transmission Manual (Market Data Transmission Network) Prepared by TAIFEX Ver. 2.16S (updated on 2017/11/23) This spec is for the feed that symbol format is linked with

More information

Realtime Regular Expressions for Analog and Mixed-Signal Assertions

Realtime Regular Expressions for Analog and Mixed-Signal Assertions . Realtime Regular Expressions for Analog and Mixed-Signal Assertions John Havlicek Scott Little 1 Motivation Assertions are a key piece to industrial verification flows SVA and PSL are based upon discrete

More information

Enterprise by HansaWorld Cash Book and Expenses

Enterprise by HansaWorld Cash Book and Expenses HANSAWORLD UNIVERSITY Enterprise by HansaWorld Cash Book and Expenses June 2013 Version 7.0 HansaWorld Ltd. TABLE OF CONTENTS TABLE OF CONTENTS TABLE OF CONTENTS...1 INTRODUCTION... 3 SETTING UP THE CASH

More information

Oracle Fusion Applications Asset Lifecycle Management, Assets Guide. 11g Release 6 (11.1.6) Part Number E

Oracle Fusion Applications Asset Lifecycle Management, Assets Guide. 11g Release 6 (11.1.6) Part Number E Oracle Fusion Applications Asset Lifecycle Management, Assets Guide 11g Release 6 (11.1.6) Part Number E22894-06 September 2012 Oracle Fusion Applications Asset Lifecycle Management, Assets Guide Part

More information

MnDOT Project Management Office Presents: Project Reporting. Presenter: Jonathan McNatty Senior Schedule Consultant DRMcNatty & Associates, Inc.

MnDOT Project Management Office Presents: Project Reporting. Presenter: Jonathan McNatty Senior Schedule Consultant DRMcNatty & Associates, Inc. MnDOT Project Management Office Presents: Project Reporting Presenter: Jonathan McNatty Senior Schedule Consultant DRMcNatty & Associates, Inc. Housekeeping Items Lines will be muted during the webinar

More information

PUF Design - User Interface

PUF Design - User Interface PUF Design - User Interface September 27, 2011 1 Introduction Design an efficient Physical Unclonable Functions (PUF): PUFs are low-cost security primitives required to protect intellectual properties

More information

Name Date

Name Date NEW DORP HIGH SCHOOL Deirdre A. DeAngelis, Principal MATHEMATICS DEPARTMENT Li Pan, Assistant Principal Name Date Summer Math Assignment for a Student whose Official Class starts with 7, 8, and 9 Directions:

More information

Frequently Asked Questions about the Ticket to Work Program

Frequently Asked Questions about the Ticket to Work Program Frequently Asked Questions about the Ticket to Work Program February 2012 Table of Contents Questions about Ticket Eligibility and/or Assignment... 1 Questions about Timely Progress... 4 Questions about

More information

Anne Bracy CS 3410 Computer Science Cornell University

Anne Bracy CS 3410 Computer Science Cornell University Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the

More information

M.Phil. Game theory: Problem set II. These problems are designed for discussions in the classes of Week 8 of Michaelmas term. 1

M.Phil. Game theory: Problem set II. These problems are designed for discussions in the classes of Week 8 of Michaelmas term. 1 M.Phil. Game theory: Problem set II These problems are designed for discussions in the classes of Week 8 of Michaelmas term.. Private Provision of Public Good. Consider the following public good game:

More information