Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann
|
|
- Dustin Robinson
- 5 years ago
- Views:
Transcription
1 Chapter 7 Registers & Register Transfers J. J. Shann J.J. Shann
2 Chapter Overview 7-1 Registers and Load Enable 7-2 Register Transfers 7-3 Register Transfer Operations 7-4 A Note for VHDL and Verilog Users Only 7-5 Microoperations 7-6 Microoperatrions on a Single Register 7-7 Register Cell Design 7-8 Multiplexer and Bus-Based Transfer for Multiple Registers 7-9 Serial Transfer and Microoperations 7-1 HDL Representation for Shift Registes and Counters VHDL 7-11 HDL Representation for Shift Registes and Counters Verilog 7-12 Chapter Summary J.J. Shann 7-2
3 Part I: Registers and Counters 7-1 Registers and Load Enable 7-6 Microoperatrions on a Single Register (Shift registers, Ripple counter, Synchronous binary counters, other counters) Part II: Register Transfers 7-2 Register Transfers 7-3 Register Transfer Operations 7-5 Microoperations 7-7 Register Cell Design 7-6 Microoperatrions on a Single Register (Multiplexer-Based Transfers) 7-8 Multiplexer and Bus-Based Transfer for Multiple Registers 7-9 Serial Transfer and Microoperations 7-12 Chapter Summary J.J. Shann 7-3
4 Part I Registers and Counters J.J. Shann
5 Clocked seq ckt: sync seq ckt consists of a group of flip-flops and combinational gates connected to form a feedback path. Flip-flops + Combinational gates (essential) (optional) Register: consists of a group of flip-flops capable of storing binary information and gates that determine how the information is transferred into the register. Counter: is essentially a register that goes through a predetermined sequence of states. J.J. Shann 7-5
6 Lecture Contents A. Simplest register ( 7-1) B. Register with parallel load ( 7-1) C. Shift registers ( 7-6) D. Ripple counter ( 7-6) E. Synchronous binary counters ( 7-6) F. Other counters ( 7-6) J.J. Shann 7-6
7 A. Simplest Register ( 7-1) Simplest register: consists of only flip-flops w/o any gates. E.g.: a 4-bit register with asynchronous clear input J.J. Shann 7-7
8 B. Register w/ Parallel Load ( 7-1) Load Approach 1: Load control input through the C inputs of the f-fs clock gating Approach 2: Load control input through the D inputs of the f-fs J.J. Shann 7-8
9 Approach 1: Load control input through the C inputs of the f-fs clock gating prevent the clock from reaching the clock input to the ckt if the contents of the reg are to be left unchanged C inputs = Load + Clock * Inserting gates in the clock pulse path produces different propagation delays b/t clock and the inputs of f-fs w/ and w/o clock gating. clock skew J.J. Shann 7-9
10 Approach 2: Load control input through the D inputs of the f-fs D i = Load I i + Load i (Load) E.g.: 4-bit register w/ parallel load J.J. Shann 7-1
11 C. Shift Registers ( 7-6) Shift register: a register capable of shifting its binary information in one or both direction Simplest shift register: unidirectional J.J. Shann 7-11
12 Shift Register w/ Parallel Load Shift register w/ parallel load: Functional table: D i = Shift Load i + Shift Load Ii + Shift i 1 Clock J.J. Shann 7-12
13 E.g.: 4-bit shift register w/ parallel load J.J. Shann 7-13
14 Bidirectional Shift Register Bidirectional shift register direction = shl = 1 shr direction SI of shr SO of shl i + 1 Flip-Flops i i 1 SO of shr SI of shl CLK D i = direction A i+1 + direction A i 1 J.J. Shann 7-14
15 Bidirectional Shift Reg w/ Parallel Load Bidirectional shift register w/ parallel load: Mode control Register S 1 S operation No change 1 Shift down 1 Shift up 1 1 Parallel load D i = S 1 S i + S 1 S i-1 + S 1 S i+1 + S 1 S I i J.J. Shann 7-15
16 D. Ripple Counters ( 7-6) Counter: a register that goes through a prescribed sequence of states upon the application of input pulses: Input pulses: may be clock pulses or originate from some external source Timing: may occur at regular or irregular intervals of time The sequence of states: may follow the binary number sequence ( Binary counter) or any other sequence of states J.J. Shann 7-16
17 Categories of counters: 1. Ripple counters: (D) The flip-flop output transition serves as a source for triggering other flip-flops. The C input of some or all flip-flops are triggered not by the common clock pulses. (not synchronous) 2. Synchronous counters: (E) The C inputs of all flip-flops receive the common clock. * T or JK flip-flops J.J. Shann 7-17
18 Binary Ripple Counter Binary count-up counter: E.g.: 4-bit binary count-up ripple counter J.J. Shann 7-18
19 Observations: FF :C = Clock pulse D = FF 1 :C 1 = ( ) ( ) D 1 = 1 FF 2 :C 2 = 1 ( ) 1 ( ) D 2 = 2 FF 3 :C 3 = 2 ( ) 2 ( ) D 3 = J.J. Shann 7-19
20 1 2 3 J.J. Shann 7-2
21 * Problem of ripple counter: Accumulation of propagation delay E.g.: 2-bit binary count-up ripple counter 1 CP J.J. Shann 7-21
22 Binary count-down counter: E.g.: 4-bit binary count-down ripple counter Downward Counting Sequence * Modify the figure in p.7-19: Connect the true output of each f-f to the C input of the next f-f. J.J. Shann 7-22
23 Summary: are asynchronous ckts Adv.: simple hardware Disadv.: become ckt w/ delay dependence and unreliable op large ripple counters can be slow ckts the length of time required for the ripple to finish J.J. Shann 7-23
24 E. Synchronous Counters ( 7-6) Sync counter: A common clock triggers all flip-flops simultaneously. Symbol: Design procedure: We can apply the same procedure of sync seq ckts. Sync counter is simpler than general sync seq ckts. No need to go through a sync seq logic design process. J.J. Shann 7-24
25 Example E.g.: 4-bit sync count-up binary counter w/ count enable line Approach 1: design procedure of sync seq ckt (Ch6) Present state Nest state EN = EN = Output CO 1 D EN = + EN = EN D1 = 1 ( EN) D2 = 2 ( 1 EN) D3 = 3 ( 2 1 EN) CO = CO: is used to extend the counter to more stages J.J. Shann 7-25
26 J.J. Shann 7-26 Approach 2: observation ) ( 1 1 EN D = ) ( EN D = ) ( EN D = CO = EN EN D = + = EN
27 Approach 3: an incrementer (Ch5) + D f-fs D 3 D 2 D 1 D = EN D = EN D1 = 1 ( EN ) D2 = 2 ( 1 EN) D3 = 3 ( 2 1 EN) CO = J.J. Shann 7-27
28 Alternative Designs for Binary Counters Two alternative designs for binary counters: Serial counter: serial gating Parallel counter: parallel gating * analogous to the ripple carry adder C 1 C 2 * analogous to the carry lookahead adder C 3 J.J. Shann 7-28
29 Binary Counter by Using JK Flip-Flops E.g.: 4-bit count-up binary counter w/ JK f-fs Binary count sequence: 3-bit A 2 A 1 A J.J. Shann 7-29
30 A 2 A 1 A J = K = EN J 1 = K 1 = EN A J 2 = K 2 = EN A 1 A J 3 = K 3 = EN A 2 A 1 A J.J. Shann 7-3
31 Up-Down Binary Counter Up-down binary counter: E.g.: 4-bit up-down binary counter J.J. Shann 7-31
32 J.J. Shann 7-32 EN D = ) ) (( 1 1 EN S S D + = ) ) (( EN S S D + = ) ) (( EN S S D + = S = up-counting 1 down-counting Up-down counter:
33 Binary Counter w/ Parallel Load E.g.: 4-bit count-up binary counter w/ parallel load Function table: Load Count I 3 I 2 I 1 I D i = Load Count i + Load Count ( i i-1 ) + Load I i J.J. Shann 7-33
34 E.g.: 4-bit count-up binary counter w/ parallel load 1 J.J. Shann 7-34
35 E.g.: 4-bit count-up binary counter w/ parallel load 1 1 D ( ) J.J. Shann 7-35
36 Generating Other Count Sequences Generate any count sequence: E.g.: design a BCD counter by using a counter w/ parallel load & async clear J.J. Shann 7-36
37 J.J. Shann 7-37
38 F. Other Counters ( 7-6) Counters: can be designed to generate any desired sequence of states Binary counter (D, E) BCD counter Divide-by-N counter: modulo-n counter a counter that goes through a repeated sequence of N states The sequence may follow the binary count or may be any other arbitrary sequence. J.J. Shann 7-38
39 BCD Counter State diagram & Count sequence: J.J. Shann 7-39
40 Synchronous BCD Counter Synchronous BCD counter: E.g.: 4-bit sync BCD counter w/ D-type f-f D 1 = 1 D D 2 = = D = ( + 4) Y = 1 8 J.J. Shann 7-4
41 E.g.: 4-bit sync BCD counter w/ T-type f-f T 1 = 1, T 2 = 8 1, T 4 = 2 1, T 8 = , y = 8 1 J.J. Shann 7-41
42 Three-decade BCD counter: J.J. Shann 7-42
43 Counter w/ Unused States n flip-flops 2 n binary states Unused states: states that are not used in specifying the sequential ckt may be treated as don t-care conditions or may be assigned specific next states Self-correcting counter: Ensure that when a ckt enter one of its unused states, it eventually goes into one of the valid states after one or more clock pulses so it can resume normal operation. Analyze the ckt to determine the next state from an unused state after it is designed. J.J. Shann 7-43
44 Example: The simplified f-f input eqs: D A = A B D B = C D C = B C Two unused states: 11 & 111 J.J. Shann 7-44
45 The logic diagram & state diagram of the ckt: Analysis * Self-correcting! J.J. Shann 7-45
46 7-12 Chapter Summary Registers Simplest register ( 7-1) Register with parallel load ( 7-1) Shift registers ( 7-6) Counters Ripple counter ( 7-6) Synchronous binary counters ( 7-6) Other counters ( 7-6) J.J. Shann 7-46
Lecture 20: Sequential Circuits. Sequencing
Lecture 20: Sequential Circuits Sequencing Elements Simple /FF Timing efinitions Source: Ch 7 (W&H) Sequencing Use flip-flops to delay fast tokens so they move through exactly one stage each cycle. Inevitably
More informationFSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015
/4/25 C2: Digital Design http://jatinga.iitg.ernet.in/~asahu/cs22 FSM Optimization Outline FSM : State minimization Row Matching Method, Implication chart method, FSM Partitioning FSM Encoding: Random,
More informationFinite state machines (cont d)
Finite state machines (cont d)! Another type of shift register " Linear-feedback shift register (LFSR)! Used to generate pseudo-random numbers! Some FSM examples Autumn 2014 CSE390C - VIII - Finite State
More informationSequential Gates. Gate Level Design. Young Won Lim 3/15/16
equential Gates Gate Level esign Copyright (c) 2011-2016 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free ocumentation License, Version
More informationDerivation of State Graphs and Tables UNIT 14 DERIVATION OF STATE GRAPHS AND TABLES. Designing a Sequential Circuit. Sequence Detectors
Derivation of State Graphs and Tables 2 Contents Case studies: sequence detectors Guidelines for construction of graphs Serial data code conversion Alphanumeric graph notation Reading Unit 4 Basic unit
More informationCS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I
CS43 Design and Analysis of Algorithms Lecture 4: Amortized Analysis I About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an
More informationAbout this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method.
About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an operation Introduce amortized cost of an operation Three Methods for the
More informationITM1010 Computer and Communication Technologies
ITM omputer and ommunication Technologies Lecture #5 Part I: Introduction to omputer Technologies K-Map, ombination and Sequential Logic ircuits ITM 計算機與通訊技術 2 Product Product-Of Of-Sum onfiguration Sum
More informationCS473-Algorithms I. Lecture 12. Amortized Analysis. Cevdet Aykanat - Bilkent University Computer Engineering Department
CS473-Algorithms I Lecture 12 Amortized Analysis 1 Amortized Analysis Key point: The time required to perform a sequence of data structure operations is averaged over all operations performed Amortized
More informationHow Computers Work Lecture 12
How Computers Work Lecture 12 A Common Chore of College Life Introduction to Pipelining How Computers Work Lecture 12 Page 1 How Computers Work Lecture 12 Page 2 Page 1 1 Propagation Times Doing 1 Load
More informationCOMP251: Amortized Analysis
COMP251: Amortized Analysis Jérôme Waldispühl School of Computer Science McGill University Based on (Cormen et al., 2009) T n = 2 % T n 5 + n( What is the height of the recursion tree? log ( n log, n log
More informationEE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis
EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-
More informationLecture 8: Skew Tolerant Domino Clocking
Lecture 8: Skew Tolerant Domino Clocking Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2001 by Mark Horowitz (Original Slides from David Harris) 1 Introduction Domino
More informationLecture 8: Skew Tolerant Design (including Dynamic Circuit Issues)
Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2007 by Mark Horowitz w/ material from David Harris 1
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application
More informationSCHEDULE CREATION AND ANALYSIS. 1 Powered by POeT Solvers Limited
SCHEDULE CREATION AND ANALYSIS 1 www.pmtutor.org Powered by POeT Solvers Limited While building the project schedule, we need to consider all risk factors, assumptions and constraints imposed on the project
More informationTHE KEYNESIAN MODEL IN THE SHORT AND LONG RUN
Lecture: THE KENESIAN MODEL IN THE SHORT AND LONG RUN In the short run actual GDP,, may be lower or higher or equal to full-employment GDP,. The aim of the Keynesian model in the short run is to explain
More informationMax Registers, Counters and Monotone Circuits
James Aspnes 1 Hagit Attiya 2 Keren Censor 2 1 Yale 2 Technion Counters Model Collects Our goal: build a cheap counter for an asynchronous shared-memory system. Two operations: increment and read. Read
More information91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010
91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 Lecture 17 & 18: Markov Decision Processes Oct 12 13, 2010 A subset of Lecture 9 slides from Dan Klein UC Berkeley Many slides over the course
More informationTDT4255 Lecture 7: Hazards and exceptions
TDT4255 Lecture 7: Hazards and exceptions Donn Morrison Department of Computer Science 2 Outline Section 4.7: Data hazards: forwarding and stalling Section 4.8: Control hazards Section 4.9: Exceptions
More informationReinforcement Learning
Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the reward function Must (learn to) act so as to maximize expected rewards Grid World The agent
More informationProject Management -- Developing the Project Plan
Project Management -- Developing the Project Plan Dr. Tai-Yue Wang Department of Industrial and Information Management National Cheng Kung University Tainan, TAIWAN, ROC 1 Where We Are Now 6 2 Developing
More information(C). D-FF P:2 U3 D:4 U1 Q:5 U5 CLK:1 C:3. U2 100k P:2 U1 SN7474 Q:3 U4 0 L U5 1M CLK:1 U3 5 H CLK L H L H. L u 5.00u 7.50u 10.
1 15. 1. (register),. FFs, FF bit. n-bits n-ffs n-bits. FFs,. FFs. FFs. MSI. FFs. JK FFs. 2. -FF -FF 1 2. -FF. -FF,. :2 U5 1M K:1 U2 100k U4 0 U3 5 U1 SN7474 :3 1. -FF. T K 0.00 2.50u 5.00u 7.50u 10.00u
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract
More information9. DIGIPATH Digital Service II (DDSII) 9.1 General
Page 1 9.1 General Rates and charges for services explained herein are contained in Part M, Section 3. Service charges referred to herein are explained in Part A, Section 3 and contained in Part M, Section
More informationReal Estate. Refinancing
Introduction This Solutions Handbook has been designed to supplement the HP-12C Owner's Handbook by providing a variety of applications in the financial area. Programs and/or step-by-step keystroke procedures
More informationEDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach
EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form
More informationA New Redundancy Strategy for High-Availability Power Systems
Kevin Covi IBM STG High-End Server Development A New Redundancy Strategy for High-Availability Power Systems Outline RAS Philosophy Review Power 6 Traditional approach Power 7 Hybrid approach Load lines
More informationLecture 7. Analysis of algorithms: Amortized Analysis. January Lecture 7
Analysis of algorithms: Amortized Analysis January 2014 What is amortized analysis? Amortized analysis: set of techniques (Aggregate method, Accounting method, Potential method) for proving upper (worst-case)
More informationDepartment of Finance and Risk Engineering, NYU-Polytechnic Institute, Brooklyn, NY
Schizophrenic Representative Investors Philip Z. Maymin Department of Finance and Risk Engineering, NYU-Polytechnic Institute, Brooklyn, NY Philip Z. Maymin Department of Finance and Risk Engineering NYU-Polytechnic
More informationOn the computational complexity of spiking neural P systems
On the computational complexity of spiking neural P systems Turlough Neary Boole Centre for Research in Informatics, University College Cork, Ireland. tneary@cs.may.ie Abstract. It is shown that there
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationData and Process Modelling
Data and Process Modelling Lab10. Quantitative Process Analysis Marco Montali KRDB Research Centre for Knowledge and Data Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016 Marco
More informationUnit 6: Amortized Analysis
: Amortized Analysis Course contents: Aggregate method Accounting method Potential method Reading: Chapter 17 Y.-W. Chang 1 Amortized Analysis Why Amortized Analysis? Find a tight bound of a sequence of
More informationPARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES
PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES WIKTOR JAKUBIUK, KESHAV PURANMALKA 1. Introduction Dijkstra s algorithm solves the single-sourced shorest path problem on a
More informationIt is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission
It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to
More informationA convenient analytical and visual technique of PERT and CPM prove extremely valuable in assisting the managers in managing the projects.
Introduction Any project involves planning, scheduling and controlling a number of interrelated activities with use of limited resources, namely, men, machines, materials, money and time. The projects
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 15 Adaptive Huffman Coding Part I Huffman code are optimal for a
More informationCSE 473: Artificial Intelligence
CSE 473: Artificial Intelligence Markov Decision Processes (MDPs) Luke Zettlemoyer Many slides over the course adapted from Dan Klein, Stuart Russell or Andrew Moore 1 Announcements PS2 online now Due
More informationThe Critical Path Method
The Critical Path Method Presented by Antonio Prensa, MBA, PMP, CCP, CSTE for Project Management Institute Puerto Rico Chapter June 2, 22 San Juan, Puerto Rico "I believe that this nation should commit
More informationDelay Budgeting in Sequential Circuit with Application on FPGA Placement
13.2 Delay Budgeting in Sequential Circuit with Application on FPGA Placement Chao-Yang Yeh and Malgorzata Marek-Sadowska Department of Electrical and Computer Engineering, University of California, Santa
More informationBits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage
Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns
More informationA Heuristic Method for Statistical Digital Circuit Sizing
A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance
More informationThunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University
Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass and Elaine Shi Cornell Tech & Cornell University State-machine replication (a.k.a. linearly ordered log, consensus, blockchain)
More informationFrequency Distributions
Frequency Distributions January 8, 2018 Contents Frequency histograms Relative Frequency Histograms Cumulative Frequency Graph Frequency Histograms in R Using the Cumulative Frequency Graph to Estimate
More informationTEPZZ 858Z 5A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2015/15
(19) TEPZZ 88Z A_T (11) EP 2 88 02 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 08.04. Bulletin / (1) Int Cl.: G06Q /00 (12.01) (21) Application number: 13638.6 (22) Date of filing: 01..13
More informationReinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein
Reinforcement Learning Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the
More informationYour investment mix should always reflect your financial objectives,
# 68 291 Allocate Assets at the Current Stage of Your Life By Garry Good, MBA Your investment mix should always reflect your financial objectives, time horizon, and risk tolerance. A well-designed portfolio
More informationSolutions - Final Exam (December 7:30 am) Clarity is very important! Show your procedure!
DPARTMNT OF LCTRICAL AND COMPUTR NGINRING, TH UNIVRSITY OF NW MXICO C-238L: Computer Logic Deign Fall 23 Solution - Final am (December th @ 7:3 am) Clarity i very important! Show your procedure! PROBLM
More informationChapter 7 A Multi-Market Approach to Multi-User Allocation
9 Chapter 7 A Multi-Market Approach to Multi-User Allocation A primary limitation of the spot market approach (described in chapter 6) for multi-user allocation is the inability to provide resource guarantees.
More informationCS 188: Artificial Intelligence Spring Announcements
CS 188: Artificial Intelligence Spring 2011 Lecture 9: MDPs 2/16/2011 Pieter Abbeel UC Berkeley Many slides over the course adapted from either Dan Klein, Stuart Russell or Andrew Moore 1 Announcements
More informationStatistical Static Timing Analysis: How simple can we get?
Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern
More informationProject Management. Project Mangement. ( Notes ) For Private Circulation Only. Prof. : A.A. Attarwala.
Project Mangement ( Notes ) For Private Circulation Only. Prof. : A.A. Attarwala. Page 1 of 380 26/4/2008 Syllabus 1. Total Project Management Concept, relationship with other function and other organizations,
More informationMiCOM P443-6/P543-7/P841
MiCOM P443-6/P543-7/P841 Release Notes P443-6/P543-7/P841 Upgrade Platform Hardware Version: M, P Platform Software Version: 75, 65, 45 Publication Reference: P443-6/P543-7/P841-RNC1-TM-EN-1 ALSTOM 2013.
More informationTutorial 3: Working with Formulas and Functions
Tutorial 3: Working with Formulas and Functions Microsoft Excel 2010 Objectives Copy formulas Build formulas containing relative, absolute, and mixed references Review function syntax Insert a function
More informationNon-Deterministic Search
Non-Deterministic Search MDP s 1 Non-Deterministic Search How do you plan (search) when your actions might fail? In general case, how do you plan, when the actions have multiple possible outcomes? 2 Example:
More informationLecture 22. Aggregate demand and aggregate supply
Lecture 22 Aggregate demand and aggregate supply By the end of this lecture, you should understand: three key facts about short-run economic fluctuations how the economy in the short run differs from the
More information8.6 FORMULATION OF PROJECT REPORT. 160 // Management and Entrepreneurship
160 // Management and Entrepreneurship (9) Raw material: List of raw material required by quality and quantity, sources of procurement, cost of raw material, tie-up arrangements, if any for procurement
More informationCS 188: Artificial Intelligence Fall 2011
CS 188: Artificial Intelligence Fall 2011 Lecture 9: MDPs 9/22/2011 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 2 Grid World The agent lives in
More informationCSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;
CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the
More informationThe Cagan Model. Lecture 15 by John Kennes March 25
The Cagan Model Lecture 15 by John Kennes March 25 The Cagan Model Let M denote a country s money supply and P its price level. Higher expected inflation lowers the demand for real balances M/P by raising
More informationVariation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses Dissertations and Theses 2016 Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions
More informationInstruction Selection: Preliminaries. Comp 412
COMP 412 FALL 2018 Instruction Selection: Preliminaries Comp 412 source code IR Front End Optimizer Back End IR target code Copyright 2018, Keith D. Cooper & Linda Torczon, all rights reserved. Students
More informationProject planning and creating a WBS
37E01500 Project Management and Consulting Practice Project planning and creating a WBS Matti Rossi Lecture 3, Tue 28.2.2017 Learning objectives Describe the project time management planning tasks, and
More information13 Combinational Logic Devices
Prof. r. J. Reichardt Prof. r.. Schwarz F Elektrotechnik/Informatik ombinational ogic evices Purpose of combinational logic design: uilding larger, more sophisticated logic circuits by using adaptable
More informationGRA 6639 Topics in Macroeconomics
Lecture 9 Spring 2012 An Intertemporal Approach to the Current Account Drago Bergholt (Drago.Bergholt@bi.no) Department of Economics INTRODUCTION Our goals for these two lectures (9 & 11): - Establish
More informationRealization of MUX-Based PUF for low power applications
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 6, Ver. IV (Nov.-Dec.2016), PP 33-43 www.iosrjournals.org Realization of MUX-Based
More informationChapter 4. Determination of Income and Employment 4.1 AGGREGATE DEMAND AND ITS COMPONENTS
Determination of Income and Employment Chapter 4 We have so far talked about the national income, price level, rate of interest etc. in an ad hoc manner without investigating the forces that govern their
More informationSECURITIES INDUSTRY AUTOMATION CORPORATION CQS
SECURITIES INDUSTRY AUTOMATION CORPORATION CQS CONSOLIDATED QUOTATION SYSTEM May 8, 2018 Version 1.7 CONTENTS VERSION HISTORY... 4 1.0 INTRODUCTION... 5 1.1 BACKGROUND... 5 1.2 DUAL SITE REDUNDANCY...
More informationCommunications Point Data Base for Serial and Ethernet Communications Protocol DNP3
Switchgear Technical Data TD280015EN Effective July 2015 Supersedes R280-90-18 8/2012 Communications Point Data Base for Serial and Ethernet Communications Protocol DNP3 For use with Eaton s Cooper Power
More informationDC Program and Project Managers Meeting #2
+ Trevor Lowing Trevor.Lowing@gmail.com DC Program and Project Managers Meeting #2 Session 1: Planning projects with MS Project Session 2: Workshop: Generating Reports with MS Project and Visual Basic
More informationGPE engineering project management. Project Management in an Engineering Context
GPE engineering project management Project Management in an Engineering Context Network diagrams in context PM SOW CHARTER SCOPE DEFINITION WBS circulation, negotiation, translation WBS WP à activities
More informationMS-E2114 Investment Science Lecture 3: Term structure of interest rates
MS-E2114 Investment Science Lecture 3: Term structure of interest rates A. Salo, T. Seeve Systems Analysis Laboratory Department of System Analysis and Mathematics Aalto University, School of Science Overview
More informationMDPs: Bellman Equations, Value Iteration
MDPs: Bellman Equations, Value Iteration Sutton & Barto Ch 4 (Cf. AIMA Ch 17, Section 2-3) Adapted from slides kindly shared by Stuart Russell Sutton & Barto Ch 4 (Cf. AIMA Ch 17, Section 2-3) 1 Appreciations
More informationMnDOT use of Calendars in Primavera P6
MnDOT Project Management Office Presents: MnDOT use of Calendars in Primavera P6 Presenter: Jonathan McNatty, PSP Senior Schedule Consultant DRMcNatty & Associates, Inc. Housekeeping Items Lines will be
More informationMobilizing Blockchain Technology for the Automotive Industry Duncan Westland Ernst & Young. #EY_Automotive
Mobilizing Blockchain Technology for the Automotive Industry Duncan Westland Ernst & Young #EY_Automotive Agenda Blockchain 101: What They Do, How They Work Blockchain Applications: Operations Ecosystems
More informationedunepal_info
facebook.com/edunepal.info @ edunepal_info TRIBHUVAN UNIVERSITY 1.Brief Answer Questions: [10 1=10] i. Write the characteristic equation of SR flip flop. ii. BIM/Fourth Semester/ITC 220: Computer Organization
More informationFinal: Total 200 points (3-hour exam)
Final: Total 200 points (3-hour exam) [Engineering Economics] IRR Calculation [15 points] One alternative for improving a company s operations is to do nothing for the next 2 years and then spend $10,000
More informationArtificial Neural Networks Lecture Notes
Artificial Neural Networks Lecture Notes Part 10 About this file: This is the printer-friendly version of the file "lecture10.htm". In case the page is not properly displayed, use IE 5 or higher. Since
More informationWhat Determines Aggregate Demand?
What Determines Aggregate Demand? AS-AD model: emphasis on aggregate supply Now we are going to study a model that sheds more light on aggregate demand We will see how the two models are related Keynesian
More informationSMT and POR beat Counter Abstraction
SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64
More informationBatch Process Oracle FLEXCUBE Investor Servicing Release 12.0 [April] [2012] Oracle Part Number E
Batch Process Oracle FLEXCUBE Investor Servicing Release 12.0 [April] [2012] Oracle Part Number E51528-01 Table of Contents Batch Process 1. ABOUT THIS MANUAL... 1-1 1.1 INTRODUCTION... 1-1 1.2 RELATED
More informationNew Statistics of BTS Panel
THIRD JOINT EUROPEAN COMMISSION OECD WORKSHOP ON INTERNATIONAL DEVELOPMENT OF BUSINESS AND CONSUMER TENDENCY SURVEYS BRUSSELS 12 13 NOVEMBER 27 New Statistics of BTS Panel Serguey TSUKHLO Head, Business
More informationSteve Keen s Dynamic Model of the economy.
Steve Keen s Dynamic Model of the economy. Introduction This article is a non-mathematical description of the dynamic economic modeling methods developed by Steve Keen. In a number of papers and articles
More informationPhysical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology
Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at
More informationDynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming
Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role
More informationMarket Operator Generator Offer Procedure
Market Operator Generator Offer Procedure Content 1. Purpose... 1 2. Scope... 1 3. Roles and Responsibilities... 2 4. Definitions... 2 5. Principles... 3 6. References... 4 7. Attachments... 4 8. Records...
More informationHandout 4: Deterministic Systems and the Shortest Path Problem
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas
More informationDefining Issues. Revenue from Contracts with Customers. June 2014, No
Defining Issues June 2014, No. 14-25 Revenue from Contracts with Customers On May 28, 2014, the FASB and the IASB issued a new accounting standard that is intended to improve and converge the financial
More informationMONTE CARLO EXTENSIONS
MONTE CARLO EXTENSIONS School of Mathematics 2013 OUTLINE 1 REVIEW OUTLINE 1 REVIEW 2 EXTENSION TO MONTE CARLO OUTLINE 1 REVIEW 2 EXTENSION TO MONTE CARLO 3 SUMMARY MONTE CARLO SO FAR... Simple to program
More informationTaiwan Futures Exchange. Market Data Transmission Manual
Taiwan Futures Exchange Market Data Transmission Manual (Market Data Transmission Network) Prepared by TAIFEX Ver. 2.16S (updated on 2017/11/23) This spec is for the feed that symbol format is linked with
More informationRealtime Regular Expressions for Analog and Mixed-Signal Assertions
. Realtime Regular Expressions for Analog and Mixed-Signal Assertions John Havlicek Scott Little 1 Motivation Assertions are a key piece to industrial verification flows SVA and PSL are based upon discrete
More informationEnterprise by HansaWorld Cash Book and Expenses
HANSAWORLD UNIVERSITY Enterprise by HansaWorld Cash Book and Expenses June 2013 Version 7.0 HansaWorld Ltd. TABLE OF CONTENTS TABLE OF CONTENTS TABLE OF CONTENTS...1 INTRODUCTION... 3 SETTING UP THE CASH
More informationOracle Fusion Applications Asset Lifecycle Management, Assets Guide. 11g Release 6 (11.1.6) Part Number E
Oracle Fusion Applications Asset Lifecycle Management, Assets Guide 11g Release 6 (11.1.6) Part Number E22894-06 September 2012 Oracle Fusion Applications Asset Lifecycle Management, Assets Guide Part
More informationMnDOT Project Management Office Presents: Project Reporting. Presenter: Jonathan McNatty Senior Schedule Consultant DRMcNatty & Associates, Inc.
MnDOT Project Management Office Presents: Project Reporting Presenter: Jonathan McNatty Senior Schedule Consultant DRMcNatty & Associates, Inc. Housekeeping Items Lines will be muted during the webinar
More informationPUF Design - User Interface
PUF Design - User Interface September 27, 2011 1 Introduction Design an efficient Physical Unclonable Functions (PUF): PUFs are low-cost security primitives required to protect intellectual properties
More informationName Date
NEW DORP HIGH SCHOOL Deirdre A. DeAngelis, Principal MATHEMATICS DEPARTMENT Li Pan, Assistant Principal Name Date Summer Math Assignment for a Student whose Official Class starts with 7, 8, and 9 Directions:
More informationFrequently Asked Questions about the Ticket to Work Program
Frequently Asked Questions about the Ticket to Work Program February 2012 Table of Contents Questions about Ticket Eligibility and/or Assignment... 1 Questions about Timely Progress... 4 Questions about
More informationAnne Bracy CS 3410 Computer Science Cornell University
Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the
More informationM.Phil. Game theory: Problem set II. These problems are designed for discussions in the classes of Week 8 of Michaelmas term. 1
M.Phil. Game theory: Problem set II These problems are designed for discussions in the classes of Week 8 of Michaelmas term.. Private Provision of Public Good. Consider the following public good game:
More information