Compose an execution of BitQueue::size, which ought to return the number of pieces at present held in line. [1 mark] (b) Write an execution of
Compose an execution of BitQueue::size, which ought to return the number of pieces at present held in line. [1 mark] (b) Write an execution of BitQueue::push, which puts the bsize least huge pieces from val onto line and updates substantial pieces. A special case ought to be tossed in situations where information would somehow or another be lost. [5 marks] (c) Write an execution of BitQueue::pop, which takes bsize bits from line, gives them as the bsize least critical pieces in the bring esteem back, also, refreshes legitimate pieces. A special case ought to be tossed when any mentioned information is inaccessible. [4 marks] (d) The equipment engineer has fabricated a specialized gadget along with a C++ library work ship off communicate information with the accompanying statement: void send(char); Utilize the BitQueue class to compose a C++ definition for: void sendmsg(const char* msg); Every one of the characters in msg ought to be encoded, in list request, utilizing the following double codes: 'a'=0, 'b'=10, 'c'=1100, and 'd'=1101. Any remaining characters ought to be overlooked. Progressive double codes ought to be bit-pressed together and the code 111 ought to be utilized to mean the finish of the message. Lumps of 8-pieces ought to be sent utilizing the send work and any excess pieces toward the finish of a message ought to be cushioned with zeros. For instance, executing sendmsg("abcd") ought to call the send work two times, with the double qualities 01011001 followed by 10111100. [10 marks] [9:36 PM, 4/14/2022] fridahkathambi71: Give a short depiction of the three segments that make up the Global Arranging System (GPS), and their essential programming, gear and information parts. [5 marks] ? [5 marks] (c) What data is imparted in the GPS signs, and how is it that it could be used by gatherers? [5 marks] (d) Explain a part of the way an additional a correspondence channel can be used to help a GPS gatherer, and what helps the client could take note. [5 marks] 3 Digital Communication II (a) Describe the OSI (Open Systems Interconnections) reference model and discuss examples of the frameworks organization works normally associated with each part. [14 marks] (b) What do we mean by layer encroachment? Analyze a piece of the reasons that could lead an intelligent show implementer to take part in layer encroachment and frame with a model. [6 marks] 4 Distributed Systems (a) You have been drawn nearer to design an event plan and complete help to work above circulate/purchase in middleware to be sent in various normal noticing circumstances. Your organization is to pitch and disseminate evident level events essential to applications. It could become involved with any dispersed events in the space of sending. Your organization may itself be scattered. Perceive a once-over of specific arrangement issues you would raise with your client prior to showing the assistance comprehensively. [12 marks] (b) By strategy for a blueprint show the use of vector tickers to execute the movement in causal solicitation of multicast messages among people from a shut, unstructured cooperation bundle. Consolidate an explanation of the message transport estimation.
A couple of banks issue their Automatic Teller Machine (ATM) card clients with a for arbitrary reasons picked individual indentification number (PIN). Others issue their clients with a fundamental PIN just, and let the clients pick their own PIN the first time they use the card in an ATM. Depict the advantages and weights of these techniques. [5 marks] Again, a couple of banks process the client PIN by encoding the record number using DES and a key known particularly to their central systems and ATMs, taking the first four hex digits of the result, overriding the digits A, . . . , F with 0, . . . , 5 independently, finally, if the essential digit of the result is 0, displacing it with a 1. What is the probability that a hooligan can get the PIN right given three hypotheses? [5 marks] Anyway various banks have used DES, and a key known unmistakably to their central structures and ATMs, to scramble the PIN (whether randomly made or client picked); they then, create the result on the alluring strip on the client's card, so the ATM can really take a look at it without reference to the central structure. Depict the obstructions of this strategy. [5 marks] To hinder attacks considering controlling alluring strips, banks in some countries have moved to using keen cards. What effect would you expect such a m(a) A (state organized) sentence structure is frequently characterized to be a 4-tuple (N, T, R, S) where R is a bunch of creation rules. Make sense of what different parts of the 4-tuple are. Make sense of additionally the (most broad type of) creation rules, how these are traditionally limited and why one could wish to confine them. [6 marks] (b) Give a syntax which is uncertain. (c) Give a language which is definitely not a standard syntax however which creates an ordinary language containing a limitless number of strings. (d) it is completeIs it conceivable to compose a language structure which creates the strings {aa, aaa, aaaaa, . . . , ap , . . .} where p is prime? (An overall contention for or against gets the job done.) (e) It is wanted to develop a straightforward "pocket-mini-computer" program utilizing yacc and lex (or other comparable robotized apparatuses of your decision) which can parse strings for example, "1+(10-5-3)*5+2=" and print the outcome, 13 for this situation. Frame the generally construction of your program parts. Give all relevant info of the information to yacc and lex (or same). (Exact syntactic subtleties are not significant, yet, your response ought to show a comprehension of the standards in question.)
4 Data Structures and Algorithms (a) A shut hash table is one in which the flood chains of key-esteem matches are held inside the actual table. Cautiously depict how the shut hash table system works for both addition and query. [6 marks] (b) Assume that the underlying test is p0 = Hash1(key) mod B and the auxiliary tests are pi , I = 1 . . . B ? 1. Examine the general benefits of the accompanying plans for picking the optional tests. (I) pi = (p0 + I) mod B (ii) pi = (p0 + 13 ? I) mod B (iii) pi = (p0 + 13 ? I + 17 ? I ? I) mod B (iv) pi = (p0 + Hash2(key) ? I + 17 ? I ? I) mod B You might accept that all the number juggling is unsigned. [8 marks] (c) Carefully depict an instrument for erasing key-esteem matches from a shut hash table. [6 marks] 5 [TURN OVER CST.2005.11.6 5 Artificial Intelligence I A perceptron processes the capacity h(x) = sgn(wT x + w0) where sgn(x) = +1 if x ? 0 and sgn(x) = ?1 in any case. The base perceptron calculation is as per the following: do { for (every model in s) { in the event that (yi(wT xi + w0) ? 0) { w = w + ?yixi w0 = w0 + ?yiR2 } } } while (botches are made in the for circle) where ? is a positive genuine, R = maxi ||xi || furthermore, w and w0 are initialised to be the zero vector and 0 separately, and where s = ((x1, y1),(x2, y2), . . . ,(xm, ym)) with yi ? {+1, ?1} is a preparation grouping. (a) Derive the double type of the perceptron calculation and express the comparing elective portrayal for w. [6 marks] (b) Explain how the perceptron might be applied to issues that are not directly detachable by presenting premise capacities. [4 marks] (c) Give a meaning of a piece. [3 marks] (d) Explain how the utilization of an appropriate part related to the double type of the perceptron calculation can be beneficial contrasted and the immediate use of premise capacities and the base perceptron calculation. [7 marks] 6 CST.2005.11.7 6 Operating System Foundations (a) A framework has paging equipment however no division equipment. Examine the possible construction of an interaction page table. What data would you anticipate to be held in a page table section? [5 marks] (b) Describe the activity of the accompanying equipment support choices for paging: (I) A couple of processor registers. PTBR holds the location of the foundation of the page-table of the current process. PTLR holds the size of the page table in bytes. [5 marks] (ii) A TLB (Translation Lookaside Buffer).
Envision that you are the computer programmer answerable for a framework that makes due the closure of a thermal energy plant. In ordinary closure mode fuel poles are removed right away, however steam age is halted solely after turbine speed has dropped to one quarter. Nonetheless, in crisis closure mode steam age should be halted right away. (a) Sketch starting UML graphs showing significant parts of your plan, counting a utilization case chart, a class graph, an arrangement outline and a statechart chart. [4 marks each] (b) What global quality guidelines ought to be applied in dealing with these and ensuing plan records? What strategies could result?
It is proposed to send data across a proper postpone channel utilizing a straightforward (window of 1) ARQ convention with a transmitter break of T. That is, if the transmitter doesn't get an affirmation for a parcel inside time T of sending the parcel, it retransmits. The deferral of the hidden channel is ? , the information rate is B and the bundle size is p bits. Bit mistakes in the channel are free and parcels of size p have a bundle blunder pace of e. Blunders in the little affirmation parcels are interesting to the point of being limited in this investigation. (a) What is the normal throughput of the ARQ convention in the event that e is zero? [4 marks] (b) What is the normal throughput assuming e is non-zero, yet little enough that e 2 is unimportantly little? [4 marks] (c) How might a forward mistake at some point code assist the throughput of the ARQ with plotting? [2 marks] (d) What is implied by the term code pace of a forward blunder code? [2 marks] (e) What code rate should a code which squared the blunder rate have to further develop throughput of the ARQ plot? [4 marks] (f ) If the forward mistake coder adds delay, what will this mean for execution?
(a) Briefly frame how a grouping of images can be encoded as a succession of Huffman codes, and make sense of under what presumptions Huffman encoding produces ideally minimal co
Question 05 A. As the power electronics design engineer in a power supply manufacturing company, you are asked to design a non-isolated voltage step down power electronics circuit which converts 24 V de in to 9 V de. i. What type of power electronics circuit is most suitable for this requirement? [05 Marks] ii. Draw mode circuits for the selected power electronics circuit. [15 Marks) ii. Derive an expression for duty cycle of above circuit and determine the required duty cycle (D) for this application [15 Marks] B. You have a single-phase multilevel inverter with 2 independent sources with source voltage Vdc - 50 V each. Answer following: i. How many voltage levels you can obtain using a 2-source inverter? draw a general output voltage waveform indicating all the voltage levels. Use values of your choice for delay angles a, and a [15 Marks] ii Determine Fourier coefficients of output voltage through n-1 to 7 ifa-15 and a-35. Hint: HIL V= [cosa, + cosa] AVac It Calculate the Modulation Index (M) [10 Marks] [10 Marks]
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started