All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
systems analysis and design 12th
Questions and Answers of
Systems Analysis And Design 12th
What is a reactive system?
On which web sites do you find companion material for this book?
Compare the curriculum of your educational program with the description of the curriculum in this introduction. Which prerequisites are missing in your program? Which advanced courses are available?
What is flipped classroom teaching?
How could we model design flows?
What is the “V-model”?
How could we define the term “synthesis”?
What is a (design) model?
Prepare a list of up to six requirements for specification/modeling languages for embedded systems!
Why could our specification lead to deadlocks?
What is a “model of computation (MoC)”?
What is a “job” and how is it different from “tasks”?
Which are the two key techniques for communication in computers?
Which description techniques can be used for capturing initial ideas about the system to be designed?
Simulate trains between Paris, Brussels, Amsterdam, and Cologne, using the levi simulation software [498]! Modify the examples included with the software such that two independent tracks exist
Download the OpenModelica simulation software. Develop a simulation model for Newton’s cradle (see, e.g., https://en.wikipedia.org/wiki/Newton%27s_cradle).
Modify the answering machine of Example 2.8 such that the owner can intervene at any time during the playing of pre-corded text or the recording of the message. Example 2.8 Figure 2.11 shows the
Model your daily schedule with a timed automaton. Hours are reflected by a variable h, days by a variable d. d = 1 means Monday, d = 7 means Sunday. On a weekend (d = 6 or d = 7), you leave the
Suppose the StateCharts model in Fig. 2.77 (left) model is given.Also, suppose that we have the following sequence of input events: b c f h g h e a b c. In the diagram in Fig. 2.77 (right), mark all
Are StateCharts determinate models if we follow the StateMate semantics? Please explain your answer!
Is SDL a determinate language? Please explain your answer!
Let us assume that you have been asked to help modeling the flow of visitors in the hypothetical Museum of Fine Future Information Nuggets (MUFFIN). We consider a steady state with no visitors
Download the levi simulation software for KPNs [496], and develop a KPN model computing Fibonacci numbers in a distributed fashion (i.e., just using a single KPN node is illegal).
One of the types of Petri nets allows several non-distinguishable tokens per place. Which components are used in a mathematical model of such nets? N=(P, ………. )
Draw the following condition/event system: N = (C, E, F), givenSpecifiy the precondition of e3 as well as the postcondition of e1. Is N simple or/and pure? Given it is not, which edge(s) need(s) to
What does a compact model of the dining philosopher’s problem look like?
CSA theory leads to 2, 3, and 4 logic strengths, corresponding to 4, 7, and 10 logic values. How many strengths and values are we using in IEEE 1164? Show the partial order among the values of IEEE
Which of the following circuits can be modeled with IEEE 1164: complementary CMOS outputs, outputs with a depletion transistor, open collector outputs, tristate outputs, or precharging on buses (if
Suppose that a bus as shown in Fig.2.78 is given. Rectangles containing an & sign denote AND-gates. Which of the IEEE 1164 values will be on the bus if both enable inputs are set to ’ 0’
Which of the following languages use asynchronous message passing: StateCharts, SDL, VHDL, CSP, Petri nets, or MPI?
Which of the following languages use a broadcast mechanism for updating variables: StateCharts, SDL, or Petri nets?
Which of the following diagram types are supported by UML:sequence charts, record charts, Y-charts, use cases, activity diagrams, or circuit diagrams?
UML™ is a frequently used modeling technique. In the table below, enter models of computation for the components in the left column and for communication in the top row. Then enter as many UML
It is suggested that locally available small robots are used to demonstrate hardware in the loop, corresponding to Fig. 3.2. The robots should include sensors and actuators. Robots should run a
Define the term “signal”!
Which circuit do we need for the transition from continuous time to discrete time?
What does the sampling theorem tell us?
Assume that we have an input signal x consisting of the sum of sine waves of 1.75 kHz and 2 kHz. We are sampling x at a rate of 3 kHz. Will we be able to reconstruct the original signal after
Discretization of values is based on ADCs. Develop the schematic of a flash-based ADC for positive and negative input voltages! The output should be encoded as 3 bit two’s complement numbers,
Suppose that we are working with a successive approximation-based 4 bit ADC. The input voltage range extends from V min =1 V (="0000") to Vmax =4.75 V (="1111"). Which steps are used to convert
Compare the complexity of flash-based and successive approximationbased ADC. Assume that you would like to distinguish between n different voltage intervals. Enter the complexity into Table 3.2,
Suppose a sine wave is used as an input signal to the converter designed in Problem 3.6. Depict the quantization noise signal for this case!Problem 3.6Discretization of values is based on ADCs.
Create a list of features of DSP processors!
Which components do FPGAs comprise? Which of these are used to implement Boolean functions? How are FPGAs configured? Are FPGAs energy-efficient? Which kind of applications are FPGAs good for?
What is the key idea of VLIW processors?
What is a “single-ISA heterogeneous multi-core architecture”? Which advantages do you see for such an architecture?
Explain the terms “GPU” and “MPSoC”!
Some FPGAs support an implementation of all Boolean functions of six variables. How many such functions exist? We ignore that some functions differ only by a renaming of variables.
In the context of memories, we are sometimes saying “small is beautiful.” What could be the reason for this?
Some levels of the memory hierarchy may be hidden from the application programmer. Why should such a programmer nevertheless care about the architecture of such levels?
What is a “scratchpad memory” (SPM)? How can we ensure that some memory object is stored in the SPM?
Develop the following FlexRay™ cluster: The cluster consists of the five nodes A, B, C, D, and E. All nodes should be connected via two channels.The cluster uses a bus topology. The nodes A, B, and
Develop the schematic of a 3 bit DAC! The conversion should be done for a 3 bit vector x encoding positive numbers. Prove that the output voltage is proportional to the value represented by the input
The circuit shown in Fig. B.4 in Appendix B is an amplifier, amplifying input voltage V 1:Compute the gain g closed for the circuit of Fig. B.4 as a function of R and R 1! Vout = 8closed * Vi
How do different hardware technologies differ with respect to their energy efficiency?
The computational efficiency is sometimes also measured in terms of billions of operations per second per watt. How is this different from the figure of merit used in Fig. 3.65? 0.001 1990 10 0.1
Why is it so important to optimize embedded systems? Compare different technologies for processing information in an embedded system with respect to their efficiency!
Suppose that your mobile phone uses a lithium battery rated at 720 mAh. The nominal voltage of the battery is 3.7 V. Assuming a constant power consumption of 1 W, how long would it take to empty the
Which challenges do you see for the security of embedded systems?
What is a “side-channel attack”? Please provide examples of sidechannel attacks!
Which requirements must be met for an embedded operating system?
Which techniques can be used to customize an embedded operating system in the necessary way?
Which requirements must be met for a real-time operating system? How do they differ from the requirements of a standard OS? Which features of a standard OS like Windows or Linux could be missing in
How many seconds have been added at New Year’s Eve to compensate for the differences between UTC and TAI since 1958? You may search in the Internet for an answer to this question.
Find processors for which memory protection units are available! How are memory protection units different from the more frequently used memory management units (MMUs)? You may search in the Internet
Describe classes of embedded systems for which protection should definitely be provided! Describe classes of systems, for which we would possibly not need protection!
Provide an example demonstrating priority inversion for a system comprising three jobs!
Download the levi learning module leviRTS from the levi web site [497]. Model a job set as described in Table 4.1.tP,P and t P,C are the times relative to the start times, at which a job requests
Which resource access protocols prevent deadlocks caused by exclusive access to resources?
How is the use of the system stack optimized in ERIKA?
Which problems have to be solved if Linux is used as an operating system for an embedded system?
Which impact does the priority inversion problem have on the design of network middleware?
How could flash memory have an influence on the design of real-time databases?
Let us consider an example demonstrating the concept of Pareto optimality. In this example, we study the results generated by task concurrency management (TCM) tools designed at the IMEC research
Which conditions must be met by computations of WCETEST?
Let us consider cache states at a control flow join. Figure 5.33 shows abstract cache states before the join.Now let us look at abstract cache states after the join. Which state would a must-analysis
Consider an incoming “bursty” event stream. The stream is periodic with a period of T. At the beginning of each period, two events arrive with a separation of d time units. Develop arrival curves
Suppose that you are working with a processor having a maximum performance of b.1.What do the service curves look like if the performance can deteriorate to b′, due to cache conflicts?2.How do the
Suppose that we try to collect amber. However, there is the risk of also collecting white phosphorus. Suppose that we collect 50 objects. We keep all of them in water to avoid fire hazards. We
Suppose that you try to compute the power consumption of your mobile phone using a shunt resistor. The following values are relevant for the computation of the power consumption at some time t:
Consider a copper plate of area A=10 cm2 and length 5 mm. How much thermal power is transferred if the difference between the temperatures at the two ends of the plate is 10°C?
Consider a hard disk drive for which we assume that half of the drives have failed after 5000 h of operation. Let us assume that failures follow an exponential distribution. Compute the corresponding
Suppose that we have a set of four jobs. Release times r i, deadlines D i, and execution times C i are as follows:Generate a graphical representation of schedules for this job set, using earliest
Suppose that we have a task set of six tasks τ1 to τ6. Their execution times and their deadlines are as follows:Precedences are as shown in Fig. 6.39. Tasks τ1 and τ2 are available immediately.
Suppose that we have a system comprising two tasks. Task 1 has a period of 5 and an execution time of 2. The second task has a period of 7 and an execution time of 4. Let the deadlines be equal to
Consider the same task set as in the previous assignment. Use earliest deadline first (EDF) for scheduling. Can any of the tasks miss its deadline? If not, why not? Generate a graphical
Loop unrolling is one of the potentially useful optimizations. Please name two potential benefits and two potential problems!
We assume that you want to use loop tiling. How can you adjust the tiling to the memory architecture at hand?
For which architectures would you expect the largest benefits from a replacement of floating-point arithmetic by fixed-point arithmetic?
Provide an overview over techniques for taking advantage of scratch pad memories!
Consider the following program:Perform at least the following optimizations:Removal of the if in the innermost loop (line 14)Loop unrolling (line 13)Constant propagationFloating-point to fixed-point
Suppose that your computer is equipped with a main memory and a scratchpad memory. Sizes and the required energy per access are shown in Table 7.2 (right). Characteristics of accesses to variables
Consider the circuit shown in Fig. 8.2. Generate a test pattern for a stuck-at-0 fault at signal h! a 0 10/1 b 0 & h 1/0 1 & i 1/0 1 g d e 1 Fig. 8.2 Test pattern at the gate level
Which state diagram corresponds to the LFSR shown in Fig. 8.9? Fig. 8.9 LFSR 4-bit shift register clock =1
Specify test patterns and expected responses for the FSM shown in Fig. 8.4. These patterns must be specified as a sequence of pairs (test pattern, expected response). Events shown in Fig. 8.4 can be
Calculate the OTF for a square annular aperture where the square central obstruction is half the size of the aperture. Graphically compare its performance against its diffraction-limited form (i.e.,
The line spread function of a two-dimensional imaging system is defined to be the response of that system to a one-dimensional delta function passing through the origin of the input plane.(a) In the
Two circular apertures are placed in the exit pupil of an imaging system as shown in Figure P5.1. Light from these two small openings create a fringe pattern in the image plane.(a) Find the spatial
Consider a pinhole camera shown in the below figure. Assume that the object is incoherent and nearly monochromatic, the distance \(R\), from the object is so large that it can be treated as infinite,
A \(100 \mathrm{~mm}\) focal length circular lens with a \(F\)-number \(=4\) is used to image a 100 line \(/ \mathrm{mm}\) cosine grating with a contrast of 0.5 in a one-to-one imaging system
Showing 2600 - 2700
of 4724
First
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Last