Question
The following shows a simple context free grammar (CFG) for a fragment of English. S -> NP VP Adj -> angry Vbe -> is VP
The following shows a simple context free grammar (CFG) for a fragment of English. S -> NP VP Adj -> angry Vbe -> is VP -> Vbe Adj Adj -> big N -> dog NP -> Det N Adj -> former N -> cat N -> Adj N P -> at Adj -> Adj PP P -> on PP -> P NP Det -> the (a) Show the parse tree that this grammar would assign to (1). (1) the dog is angry at the cat (b) One respect in which this grammar overgenerates is that some adjectives, including former, occur only before a noun (see (2)) and that PPs do not combine with adjectives occurring before a noun (see (3)). (2) * the dog is former (3) * the angry at the cat dog is big Show how the grammar given above could be modified to prevent this type of overgeneration. (c) The grammar also behaves incorrectly with examples (4), (5) and (6): (4) * the dog is big at the cat (big does not take a PP) (5) * the dog is angry on the cat (angry only takes PPs where the P is at) (6) * the dog is angry at the cat at the cat (adjectives may not combine with multiple PPs) Show modifications to the grammar which would prevent these types of overgeneration. (d) Describe how the overgeneration in part (c) could be dealt with in a feature structure (FS) grammar, giving full lexical entries for angry and big and details of rules and other lexical entries as necessary to explain your account.
ensure to tackle all
(a) What is an (m, M)R-Tree? Explain how new items can be inserted and how range queries can be evaluated. (b) Explain the trade-off in varying m between small and large values. If the dataset is known in advance, would a large or small value of m be appropriate? (c) R+-Trees, R -Trees, and QSF-Trees are special forms of R-Tree. Explain how each differs from the basic R-Tree and what advantage is presented by each modification. (d) As private motor cars increase in electronic sophistication, Sentient Computing becomes ever more applicable. Describe two context-aware behaviours that a car's electronic systems could exhibit, making use of general-purpose processing power, data storage, and wireless data communication.
Measuring the energy between atoms in a molecular dynamics simulation is a very common calculation which computers are used to solving, to model the movement of molecules like proteins, enzymes, DNA, RNA in order to better understand how they perform their functions in biology and chemistry. For a system with N atoms, there will be an N by 3 array of doubles, representing the coordinates of each atom in 3 dimensional space. Then, based on the distance between atoms, a calculation is performed that represents the energy. For this exercise we'll use a very simplified version of the energy, 1.) assuming that invoking Math.sqrt costs us 13 ticks of the clock; and 2.) assuming that Math.pow invocations cost 5 + 3*P ticks (where P is the second argument, the power to which the first argument is raised).
1 public double calculateEnergy(double[][] coords, double[] eps, int numAtoms) {
2 double energySum = 0.0;
3 double r0 = 1.2;
4 for (int i = 0; i < numAtoms-1; i++) {
5 for (int j = 0; j < numAtoms; j++) {
6 double distance = Math.sqrt( (coords[i][0] - coords[j][0]) * (coords[i][0] - coords[j][0]) +
7 (coords[i][1] - coords[j][1]) * (coords[i][1] - coords[j][1]) +
8 (coords[i][2] - coords[j][2]) * (coords[i][2] - coords[j][2]) );
9 double term2 = Math.pow( (r0/distance), 12 ) ;
10 double term1 = Math.pow( (r0/distance), 6) ;
11 double epsilon = Math.sqrt( eps[i] * eps[i] + eps[j] * eps[j]);
12 energySum = energySum + (4.0 * epsilon * (term1 - 2.0 * term2) );
13 }
14 }
15 return energySum;
16 }
The above example is the basic form of what is known as a 6-12 potential, and the names is based on the power of the r0/distance terms. So, from the information given, what would the big-O signature, and a detailed analysis of this algorithm look like...? If the inner loop was changed to:
for (int j= i+1; j < numAtoms; j++)
then what would the big-O signature, and a detailed analysis of the algorithm look like...?
(a) Name five different types of intellectual property. (b) Distinguish between "Deep linking" and "Direct linking". Can a search engine deep link without infringing the copyright of the original site? (c) Why is the use of thumbnails of pictures by a search engine fair use? (d) Why are there likely to be only a few dominant search engines? 14 E-Commerce (a) In a telecommunications business context, what is meant by Triple and Quadruple Play strategies, and what will be the effects of the adoption of such strategies? (b) Describe possible business models for a small independent Internet television start-up company. Estimate start-up costs and profitability, and describe some of the challenges such a television station will need to overcome.
(a) (i) Briefly describe the purpose of broadband fixed wireless access (FWA) and give typical situations where it could be deployed. (ii) What advantages does radio offer over traditional wired access? (b) Explain how intersymbol interference (ISI) arises in a wireless communication system and its effect on system performance. (c) (i) Describe how linear equalisation orthogonal frequency division multiplexing (OFDM) can be used to combat ISI. [4 marks] (ii) Highlight a problem which can occur when using linear equalisation and describe an alternative equalisation approach that can overcome this problem. What problem can occur with this alternative approach? (iii) Highlight problems that arise with the use of OFDM. In what situation is OFDM preferred over the use of equalisation?
(a) Describe, with examples, the function of a naming service for a largescale distributed system. Include definitions for "name space" and "naming domain". (b) Discuss consistency versus availability for naming data in large-scale systems. (c) How can any distributed naming service be engineered so that invocations on behalf of users can be resolved efficiently in the presence of failures and heavy load? (d) Contrast the assumptions under which DNS was designed originally for the Internet, with the properties of dynamically formed groups of mobile hosts using wireless communication (MANETS). How might DNS-like services be provided for MANETS? 5 Advanced Systems Topics Modern peer-to-peer (P2P) systems are typically described as structured or unstructured. (a) Compare and contrast these two approaches. Include a discussion of the general topology, membership management and query mechanisms. Use examples to support your answer. (b) Which approach is more resilient to churn? Justify your answer. (c) One early criticism of P2P systems was that they did not consider network latencies. Describe how one can add proximity awareness to: (i) unstructured P2P systems (ii) structured P2P systems. (d) Swarming P2P systems like BitTorrent are designed for efficient (and incentive compatible) download of large files. However, it is typically not possible to use the file until it has downloaded in its entirety. Sketch the design of a swarming P2P system which supports streaming video - that is, allows playback of video to overlap the ongoing download of the remainder of the stream. Comment on how efficient (in terms of network resources) your system would be in comparison with a system like BitTorrent
Write program to print your name on the screen. Write program to print "Welcome to C++" on the screen Write to program to calculate the area of a square.
Write program to find sum of all even numbers between 1 to n. Write program to print all natural numbers from 1 to n.
A majority gate with three inputs signals logic one on its output if two or more of its inputs are one, and zero otherwise. A minority gate is its complement. (a) Give the boolean equation for a minority gate as a sum of products. (b) Sketch the circuit diagram for a minority gate using NAND gates and inverters. (c) Sketch the transistor-level circuit diagram for an alternative implementation as a single stage of CMOS logic. [3 marks] (d) Calculate the number of transistors required for each implementation. (e) Assuming that a conducting p-channel has a resistance twice that of a similarly sized n-channel, use logical effort to compare the performance of the two implementations. 3 Digital Communication II (a) The Transmission Control Protocol (TCP) employs a transmit window and cumulative acknowledgement and timeout system, as well as sequence numbering of packets, to achieve reliable delivery of data. (i) Outline the procedure for round-trip time estimation and the calculation of the retransmission timer. (ii) Explain the function of buffering at the sender and receiver. (iii) How do fast retransmit and fast recovery improve performance after packet loss? (b) In a wireless network, delay to access the channel due to scheduling of the media access control protocol, and random packet loss due to interference, may be non-negligible. (i) Explain how this can interfere with the round-trip time estimation process above. (ii) Explain how this can interfere with the congestion control scheme that TCP employs.
Information retrieval systems vary in the expressivity of the query languages they employ. For instance, some systems support proximity search: if two query terms are connected by the "Next" operator, then only those documents are retrieved where the query terms appear close together (i.e., within a certain number of words of each other). (a) List and briefly describe other ways in which the syntax and the interpretation of query languages may vary. (b) Describe with an example how the "Next" operator described above is implemented efficiently in modern information retrieval systems. Your answer should include a description of the data structure(s) necessary to support it. (c) A search engine supports error correction in the following way: If an error is suspected in a query term, the system provides a link labelled "Did you mean X?", where X is the corrected term, in addition to its normal results. The link leads to a list of retrieved documents, corresponding to a variant of the original query, with X replacing the misspelled term. (i) Explain why it is non-trivial to implement this feature efficiently. (ii) Discuss methods for implementing this feature in a realistic setting.
(a) One or more processors must be selected for inclusion in a portable device that handles audio, image, video, telephone calls and simple word processing. Possible design combinations include: a single processor; a pair of basically similar processors but with different coprocessor and bus structures; a standard processor and a custom VLIW processor. Explain whether one of these combinations is clearly the best. [2 marks] (b) For each of the following processor technologies, justify whether it is applicable in the device: (i) Dynamically Scheduled Instruction Dispatch;
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started