A control engineer, N. Minorsky, designed an innovative ship steering system in the 1930s for the U.S. Navy. The system is represented by the block diagram shown in Figure E2.8, where Y(s) is the...
An armature-controlled DC motor is driving a load. The input voltage is 5 V. The speed at t = 2 seconds is 30 rad/s, and the steady speed is 70 rad/s when t . Determine the transfer function...
Consider the feedback system depicted in Figure CP2.2. (a) Compute the closed-loop transfer function using the series and feedback functions. (b) Obtain the closed-loop system unit step response with...
A system that controls the mean arterial pressure during anesthesia has been designed and tested [12]. The level of arterial pressure is postulated to be a proxy for depth of anesthesia during...
A system has the characteristic equation s4 + 10s3 + 32s2 + 37s + 20 = 0. Using the Routh- Hurwitz criterion, determine if the system is stable.
A control system has the structure shown in Figure E6.4. Determine the gain at which the system will become unstable. Figure E6.4 Feedforward system. R(s)
The achievement of safe, efficient control of the spacing of automatically controlled guided vehicles is an important part of the future use of the vehicles in a manufacturing plant [14, 15]. It is...
The frequency response for a process of the form is shown in Figure E8.4. Determine K and a by examining the frequency response curves. Figure E8.4 Bode diagram. Ks G(s) (sa(s220100) 10 /20 log(G11 ;...
Consider a system that has two CPUs, each CPU having two threads (hyperthreading). Suppose three programs, P0, P1, and P2, are started with run times of 5, 10 and 20 msec, respectively. How long will...
A DMA controller has five channels. The controller is capable of requesting a 32-bit word every 40 nsec. A response takes equally long. How fast does the bus have to be to avoid being a bottleneck?
Consider a 32-bit microprocessor whose bus cycle is the same duration as that of a 16-bit microprocessor. Assume that, on average, 20% of the operands and instructions are 32 bits long, 40% are 16...
Consider a single-level cache with an access time of 2.5 ns, a line size of 64 bytes, and a hit ratio of H = 0.95. Main memory uses a block transfer capability that has a first-word (4 bytes) access...
An address field in an instruction contains decimal value 14. Where is the corresponding operand located for a. Immediate addressing? b. Direct addressing? c. Indirect addressing? d. Register...
Consider a 16-bit processor in which the following appears in main memory, starting at location 200: The first part of the first word indicates that this instruction loads a value into an...
Consider the following EER diagram that describes computer systems at a company. Provide your own attributes and key for each entity type. Supply max cardinality constraints justifying your choice....
Figure 8.12 shows an example of an EER diagram for a small private airport database that is used to keep track of airplanes, their owners, airport employees, and pilots. From the requirements for...
Consider Figure 2. 12, for which there is an institutional network connected to the Internet. Suppose that the average object size is 850,000 bits and that the average request rate from the...
Suppose the function f expects two numeric values as its inputs and returns the smaller of the two values as its output value. If w, x, y, and z represent numeric values, what is the result returned...
Visit the website of your choice and explore it thoroughly. Prepare a report analyzing the various functions provided by that website and its information requirements. Your report should answer these...
Determine, for the typical algorithms that you use to perform calculations by hand, the running time to do the following: a. Add two N-digit integers. b. Multiply two N-digit integers. c. Divide two...
Given two sorted lists, L1 and L2, write a procedure to compute L1 L2 using only the basic list operations.
Construct a permutation of 20 elements that is as bad as possible for quicksort using median-of-three partitioning and a cutoff of 3.
Consider a university database for the scheduling of classrooms for final exams. This database could be modeled as the single entity set exam, with attributes course-name, section-number,...
Consider as shown below, and suppose that authors could also appear as top level elements. What change would have to be done to the relational schema? similar PCDATA declarations for year,...
Construct a B+-tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31) Assume that the tree is initially empty and values are added in ascending order. Construct B+-trees for...
Develop the interface standards (omitting the interface template) for the DFD in exercise E in Chapter 5.
Consider the state transition diagram of Figure. Suppose that it is time for the OS to dispatch a process and that there are processes in both the Ready state and the Ready/Suspend state, and that at...
Write SQL queries to answer the following questions: a. List the numbers of all sections of course ISM 3113 that are offered during the semester "1-2015." b. List the course IDs and names of all...
How many tutors have a status of Temp Stop? Which tutors are active? Based on the relations shown in Figure 6-12. The database tracks an adult literacy program. Tutors complete a certification class...
Examine the two applications shown in Figures 8-9a and 8-9b. Identify the various security considerations that are relevant to each environment.? (a) Static page request Web Server Application Server...
An automated storage/retrieval system has four aisles. The storage racks in each aisle are 40 ft high and 200 ft long. The S/R machine for each aisle travels at a horizontal speed of 400 ft/min and a...
A flexible manufacturing system is used to produce four parts. The FMS consists of one load/unload station and two automated processing stations (processes X and Y). The number of servers for each...
A light-seeking control system, used to track the sun, is shown in Figure P1.5. The output shaft, driven by the motor through a worm reduction gear, has a bracket attached on which are mounted two...
The Burj Dubai is the tallest building in the world [94]. The building, shown in Figure AP1.5, stands at over 800 m with more than 160 stories. There are 57 elevators servicing this tallest...
Figure P2.22 shows two pendulums suspended from frictionless pivots and connected at their midpoints by a spring [1]. Assume that each pendulum can be represented by a mass M at the end of a mass...
Consider the mechanical system depicted in Figure CP2.4.The input is given by f(t), and the output is y(t). Determine the transfer function from f(t) to y(t) and, using an m-file, plot the system...
A satellite single-axis attitude control system can be represented by the block diagram in Figure CP2.5. The variables k, a, and b are controller parameters, and J is the spacecraft moment of...
Consider the feedback control system in Figure CP2.9, where G(s) = s + 1/s + 2 and H(s) = 1/s + 1 (a) Using an m-file, determine the closed-loop transfer function. (b) Obtain the pole-zero map using...
A robot gripper shown in part (a) of Figure P4.17, is to be controlled so that it closes to an angle θ by using a DC motor control system, as shown in part (b). The model of the control...
An autopilot designed to hold an aircraft in straight and level flight is shown in Figure CP5.7. (a) Suppose the controller is a constant gain controller given by Gc(s) = 2. Using the Isim function,...
Given a relation schema R (A, B, C) that is in 3NF: a. State the conditions under which modification anomalies can exist. b. Express the conditions stated above in terms of functional dependencies....
A set-associative cache has a block size of four 16-bit words and a set size of 2. The cache can accommodate a total of 4096 words. The main memory size that is cacheable is 64K 32 bits. Design the...
Consider a machine with a byte addressable main memory of 216 bytes and block size of 8 bytes. Assume that a direct mapped cache consisting of 32 lines is used with this machine. a. How is a 16-bit...
Consider the following source code segment: a. Write a corresponding Pentium assembly code segment. b. Rewrite as an IA-64 assembly code segment using predicated execution techniques. for ( i = 0; <...
UDP and TCP use I s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01010100, 01110100. What is the 1s complement of the sum of these 8-bit bytes? Show all...
Consider sending a large file from a host to another over a TCP connection that has no loss. a. Suppose TCP uses AIMD for its congestion control without slow start. Assuming cwnd increases by I MSS...
Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are...
Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only dependencies that hold for R, do the following: (a) Identify the...
Alden, Inc. has hired you to review its internal controls for the purchase, receipt, storage, and issuance of raw materials. You observed the following: Raw materials, which consist mainly of...
How do Porter's competitive forces model, the value chain model, synergies, core competencies, and network-based strategies help companies use information systems for competitive advantage? a. Define...
Give the prefix, infix, and postfix expressions corresponding to the tree in Figure 4.71. e b)
Write a program to compute word ladders where single-character substitutions have a cost of 1, and single-character additions or deletions have a cost of p > 0, specified by the user. As mentioned at...
New York City's Taxi & Limousine Commission has mandated that all licensed city cab owners install new information systems in their cabs. The new state-of-the-art system connects the cabs to a...
Consider the relational database of Figure, where the primary keys are underlined. Give an expression in the relational algebra to express each of the following queries: a. Find the names of all...
Let the following relation schemas be given: R = (A, B, C) S = (D, E, F) Let relations r(R) and s(S) be given. Give an expression in SQL that is equivalent to each of the following queries. a. A(r)...
Any propositional logic sentence is logically equivalent to the assertion that each possible world in which it would be false is not the case. From this observation, prove that any sentence can be...
This exercise completes the analysis of the airport-sitting problem in Figure. a. Provide reasonable variable domains, probabilities, and utilities for the network, assuming that there are three...
Modify and extend the Bayesian network code in the code repository to provide for creation and evaluation of decision networks and the calculation of information value.
Consider the problem faced by an infant learning to speak and understand a language. Explain how this process fits into the general learning model, identifying each of the components of the model as...
Using Microsoft Project, build a project schedule based on the following scenario. Print the Gantt chart. If required by your teacher, also print the Network Diagram (i.e., a PERT chart). In the...
Suppose that you are an analyst developing a new information system to automate the sales transactions and manage inventory for each retail store in a large chain. The system would be installed at...
Develop two use scenarios for the DFD in exercise E in Chapter 5.
Which of the following could be an actor found on a use case diagram? Why? Ms. Mary Smith Supplier Customer Internet customer Mr. John Seals Data-entry clerk Database administrator
Do lifelines always continue down the entire page of a sequence diagram? Explain.
Repeat Problem 10.3d for the execution profiles of Table 10.9b. Comment on the results. Consider a set of three periodic tasks with the execution profiles of Table 10.9a. Develop scheduling diagrams...
Create an example of an ER diagram with a business rule. Map the ER diagram and show several records in the resulting relations, indicating compliance with the business rule.
Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes.
For each of the descriptions below, perform the following tasks: i. Identify the degree and cardinalities of the relationship. ii. Express the relationships in each description graphically with an...
Describe the primary differences between the conceptual and logical data models.
Write an SQL query to list the Read scores of students who were ever taught by tutors whose status is Dropped.
List the name of each employee, his or her birth date, the name of his or her manager, and the manager's birth date for those employees who were born before their manager was born; label the...
Display the customer ID, name, and order ID for all customer orders. For those customers who do not have any orders, include them in the display once. Display the EmployeelD and EmployeeName for...
Match the following terms and definitions: a. Lost previous data content b. Detailed historical data c. Data not altered or deleted d. Data warehouse of limited scope e. Dimension and fact tables f....
An automated guided vehicle system has an average travel distance per delivery = 200 m and an average empty travel distance = 150 m. Load and unload times are each 24 s and the speed of the AGV = 1...
A 14-station transfer line has been logged for 2400 min to identify type of downtime occurrence, how many occurrences, and time lost. The results are presented in the table below. The ideal cycle...
The monthly usage for a component supplied to an appliance assembly plant is 5,000 parts. There are 21 working days in the month and the effective operating time of the plant is 450 min per day....
Many luxury automobiles have thermostatically controlled air-conditioning systems for the comfort of the passengers. Sketch a block diagram of an air-conditioning system where the driver sets the...
Determine a state variable differential matrix equation for the circuit shown in Figure E3.17: Ci FIGURE E3.17 RC circuit.
Obtain a state variable matrix for a system with a differential equation d'y di d'y dy dt + 4 dr? + 6- + 8y = 20u(1). %3D
A digital audio system is designed to minimize the effect of disturbances as shown in Figure E4.2. As an approximation, we may represent G(s) = K2. (a) Calculate the sensitivity of the system due to...
An aircraft arresting gear is used on an aircraft carrier as shown in Figure DP3.3. The linear model of each energy absorber has a drag force fD = KDx3. It is desired to halt the airplane within 30 m...
For the system with unity feedback shown in Figure E5.l l, determine the steady-state error for a step and a ramp input when Figure E5.11 Unity feedback system. 20 G(s)--+ 14s + 50 Gs) Yts)
The model for a position control system using a DC motor is shown in Figure DP5.6. The goal is to select K1 and K2 so that the peak time is Tp ¤ 0.5 second and the overshoot P.O. for a step...
A system has a characteristic equation q(s) = s6 + 9s5 + 31.25s4 + 61.25s3 + 67.75s2 + 14.75s + 15 = 0. (a) Determine whether the system is stable, using the Routh-Hurwitz criterion. (b) Determine...
Consider the feedback control system in Figure DP6.7.The system has an inner loop and an outer loop. The inner loop must be stable and have a quick speed of response. (a) Consider the inner loop...
Understanding the behavior of a human steering an automobile remains an interesting subject [14,15, 16, 21]. The design and development of systems for four-wheel steering, active suspensions, active,...
Consider the device for the magnetic levitation of a steel ball. Obtain a design that will provide a stable response where the ball will remain within 10% of its desired position. Assume that y and...
Consider the following solution to the mutual-exclusion problem involving two processes P0 and P1. Assume that the variable turn is initialized to 0. Process P0's code is presented below. /* Other...
Consider a cache with a line size of 64 bytes. Assume that on average 30% of the lines in the cache are dirty. A word consists of 8 bytes. a. Assume there is a 3% miss rate (0.97 hit ratio). Compute...
Consider a computer with the following characteristics: total of 1Mbyte of main memory; word size of 1 byte; block size of 16 bytes; and cache size of 64 Kbytes. a. For the main memory addresses of...
For the cache design of the preceding problem, suppose that increasing the line size from one word to four words results in a decrease of the read miss rate from 3.2% to 1.1%. For both the non burst...
On a typical microprocessor, a distinct I/O address is used to refer to the I/O data registers and a distinct address for the control and status registers in an I/O controller for a given device....
Consider a floating-point format with 8 bits for the biased exponent and 23 bits for the significand. Show the bit pattern for the following numbers in this format: a. -720 b. 0.645
Compare zero-, one-, two-, and three-address machines by writing programs to compute X = (A + B Ã C) / (D - E Ã F) for each of the four machines. The instructions available for use are...
Consider the following C program fragment dealing with floating-point values: a[i] = p * q; c = a[j]; The compiler cannot establish that I j, but has reason to believe that it probably is. a. Write...
Consider the following NAMS instruction: cmp vleft, vright For signed integers, there are three status flags that are relevant. If vleft = vright, then ZF is set. If vleft > vright, ZF is unset (set...
A company has a resource XYZ. If there is a breach of security, the company may face a fine of $100,000 and pay another $20,000 to clean up the breach. The company believes that an attack is likely...
Consider a disk with the following characteristics (these are not parameters of any particular disk unit): block size B=512 bytes, interblock gap size G=128 bytes, number of blocks per track=20,...
Figure 23.6 shows the log corresponding to a particular schedule at the point of a system crash for the four transactions T1, T2, T3, and T4 of Figure 19.4. Suppose that we use the immediate update...
Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates RI =500 kbps, R2 =2 Mbps, and R) = I Mbps. a. Assuming no other traffic in the network,...