Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Suggest two logical formulae that might appear in Evil Robot's knowledge base in order to describe the initial state for the above problem ------MOREOVER DETAILS

Suggest two logical formulae that might appear in Evil Robot's knowledge base in order to describe the initial state for the above problem

------MOREOVER DETAILS ---------

Specification and Verification II Describe the syntax and semantics of Computation Tree Logic (CTL). [4 marks] Jot down CTL formulae expressing the following properties: (a) if req goes high then it will stay high until ack goes high and then go low on the next cycle [2 marks] (b) if ever req is high and started is low then eventually error will become permanently high [2 marks] Briefly describe the main ideas underlying model checking. What is symbolic model checking? [4 + 4 marks] Compare and contrast the use of a model checker and a theorem prover for formal verification. Describe the situation calculus, concentrating on the fundamental elements that you would expect to see independently of any specific problem. [5 marks] em. [2 marks] (c.i) Give two examples of a possibility axiom that might appear in the knowledge base. [5 marks] (d.i) Give two examples of a successor-state axiom that might appear in the knowledge base. One of these should in addition address the ramification problem. Explain how it does this.With the three datasets you have decided to use multiple tools in your Hadoop environment, an external hive table called "Company" in the default database using Company_data.csv , use a separate folder for file in HDFS. After Completing your hive table make sure you can access it, secondly upload the Company_Emp_data.csv and the Sales_data.csv to a HDFS folder. Write brief notes on functions as values and results in ML, illustrated with the help of the functionals map and exists. What functions can we obtain from these via currying? [7 marks] (b.ii) Consider the function zarg defined below: fun zarg f ([], e) = e | zarg f (x::xs, e) = f(x, zarg f (xs,e)); Show that with the help of this function, it is possible to an expression for the sum of a given list of integers. Then describe what zarg does in general. [5 marks] Then:

what issue does grouping endeavor to settle? Let us Assume a processor has two symmetric groups that contain both utilitarian units and an issue cradle. In this processor, directions should be controlled to a specific bunch before they are embedded in an issue cushion. What should the two fundamental objectives of a decent guiding strategy be? (c.ii) A polymorphic type of branching trees can be declared as follows. Note that the children of a branch node are given as a list of trees, and that only the leaf nodes carry labels. datatype 'a vtree = Lf of 'a | Br of ('a vtree) list; (i.i) Write function flat t that converts a given tree t of this type to a list of the labels (without eliminating duplicates). Your function should run in linear time in the size of the tree. [5 marks] (ii.i) Write function counts x t that counts the number of times that x occurs as a label in t, but without first converting t to a list.

How might you expand the meaning of recursive identification to sets of processable capabilities? A grouping of regular numbers is a complete capability s : 22N N. The arrangement is recursive if and provided that s is processable. A limited succession of regular numbers is determined by a couple (l, x), where l N is the quantity of components, and x : [221, 22l] N is a capability that characterizes those components. The case l = 0 characterizes the invalid succession. Your "backers" have raised a concern that this app will be able to diagnose depression, and that in consequence you may be storing substantial amounts of sensitive personal information. Discuss this problem from the viewpoints of both data protection law and ethics. [12 marks] 8 CST.2014.4.9 8 Security I (a) Windows implements static inheritance for the access-control lists of NTFS files and folders. (i) What does static inheritance mean here and how does it differ from dynamic inheritance? [4 marks] (ii) Five flag bits (ci,oi,np,io,i) in each NTFS access-control entry (ACE) manage how it is inherited. Briefly describe the purpose of each bit. [5 marks] (iii) User mike gives his folder project the following access-control list: project AllowAccess mike: full-access (oi,ci) AllowAccess alice: read-execute (ci,np) AllowAccess bob: read-only (oi) It contains one folder and two text files, none of which have any noninherited access-control entries: project\doc.txt project\src project\src\main.c For each of these three objects, list all inherited access-control entries, showing in parentheses the inheritance-control flag bits that are set (using the same notation as above). [5 marks] (b) Describe the purpose and four typical functions of a root kit. [6 marks] 9 (TURN OVER) CST.2014.4.10 9 Security I Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random permutation that operates on the 26 letters of the English alphabet: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 m A B C D E F G H I J K L M N O P Q R S T U V W X Y Z EK(m) P K X C Y W R S E J U D G O Z A T N M V F H L I B Q As the XOR operation is not defined on the set {A, . . . , Z}, we replace it here during encryption with modulo-26 addition (e.g., C D = F and Y C = A). (a) Encrypt the plaintext "TRIPOS" using: (i) electronic codebook mode; [2 marks] (ii) cipher-block chaining.

Question: what number stable substance addressable recollections would you expect a completely associated Hopfield network comprising of 100 neurons to be prepared to do putting away? The retina is many times viewed as a picture catch gadget; however it has about 800 million info sensors (photoreceptors) yet just 1 million result strands (optic nerve axons). What are a ramifications of this 1100-to-1 proportion of input channels to yield channels? [4 marks]. Provide some quantitative proof and contentions supporting the suggestion that: "Availability is the essential computational standard in the cerebrum". (b) What is the conditional probability p(x|y), the probability of event x given that event y has occurred, provided that we know the following? p(x), the unconditional probability of event x p(y), the unconditional probability of event y p(y|x), the probability of event y given that event x has occurred [3 marks] (c) Consider a binary symmetric communication channel, whose input source is the alphabet X = {0, 1} with probabilities {0.5, 0.5}; whose output alphabet is Y = {0, 1}; and whose channel matrix is 1 1 where is the probability of transmission error. (i) What is the entropy of the source, H(X)? [1 mark] (ii) What is the probability distribution of the outputs, p(Y ), and the entropy of this output distribution, H(Y )? [3 marks]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Elements Of Chemical Reaction Engineering

Authors: H. Fogler

6th Edition

013548622X, 978-0135486221

More Books

Students also viewed these Computer Network questions

Question

Contrast efficiency and utilization.

Answered: 1 week ago

Question

How can long-term capacity requirements be determined?

Answered: 1 week ago