Basic technologies. Lexical analysis. Lexical analysis. Basic technologies. Syntactical analysis Parser generators Rewrite engines
|
|
- Charleen Leonard
- 7 years ago
- Views:
Transcription
1 Bsc technologes Generc Lnguge Technology: Bsc technologes Pro.dr. Mrk vn den Brnd Syntctcl nlyss Prser genertors Rewrte engnes / Fcultet Wskunde en Inormtc PAGE 1 Tsks nd orgnzton o lexcl nlyzer Speccton o lexcl tokens v regulr expressons Implementton o regulr expressons (non-)determnstc nte utomt trnslton o regulr expresson to utomton progrm text (chrcters) Lexcl nlyzer Syntctcl nlyss get next token token prse tree Prser Symol tle / Fcultet Wskunde en Inormtc PAGE 2 / Fcultet Wskunde en Inormtc PAGE 3
2 Flotng pont numers Tsks o the lexcl nlyzer: redng the nput nd producton o tokens elmnton o lyout nd comments keepng trck o poston normton lexcl l syntx [0] ([1-9][0-9]*) -> UnsgnedInt [\+\-]?\ UnsgnedInt -> SgnedInt UnsgnedInt "." [0-9]+ ([ee] SgnedInt)? -> UnsgnedRel UnsgnedInt [ee] SgnedInt -> UnsgnedRel UnsgnedInt UnsgnedRel -> Numer e e e e-07 / Fcultet Wskunde en Inormtc PAGE 4 Pge 5 A regulr expresson (r.e.) r over n lphet Σ corresponds to the lnguge L(r) 1. s r.e. nd corresponds to {} 2. Σ s r.e. nd corresponds to {} 3. Suppose r nd s re r.e. s correspondng to the lnguges L(r) nd L(s). lterntve (r) (s) s r.e. L(r) L(s). conctenton (r) (s) s r.e. L(r) L(s) c. Kleene closure (r)* s r.e. (L(r))* d. rckets (r) s r.e. L(r) Opertors re let-ssoctve nd prortes re * > conctenton > A regulr denton over lphet Σ hs the orm: re 1 -> d 1 re 2 -> d 2 re n -> d n where d re derent nmes nd ech re s r.e. over lphet Σ {d 1, d 2,, d -1 } Thus, n re occur only nmes whch re lredy dened / Fcultet Wskunde en Inormtc PAGE 6 / Fcultet Wskunde en Inormtc PAGE 7
3 A regulr expresson cn e compled nto nte utomton (FA = nte utomton) whch s recognzer or the correspondng regulr lnguge A nte utomton s non-determnstc severl derent trnstons re possle or one nput symol n stte (NFA) There re two possle wys o trnsormng r.e. nto determnstc nte utomton: 1. r.e. NFA DFA 2. re r.e. DFA The generted DFA hs to e optmzed Otherwse the nte utomton s determnstc (DFA) / Fcultet Wskunde en Inormtc PAGE 8 / Fcultet Wskunde en Inormtc PAGE 9 Non-determnstc nte utomton conssts o: 1. Set o sttes S 2. Input lphet Σ 3. Trnston uncton whch tkes stte/symol pr nd yelds set o new sttes 4. The strt stte s 0 S 5. A set F o cceptng sttes Exmple: S = {0,1,2,3} Σ = {, } S 0 = 0 F = {3} Ths utomton ccepts: ( )* Trnston uncton: Stte 0 {0,1} {0} 1 {2} 2 {3} / Fcultet Wskunde en Inormtc PAGE 10 / Fcultet Wskunde en Inormtc PAGE 11
4 Trnstons my lso e lelled wth NFA ccepts strng x There exsts pth n the trnston dgrm rom strt to nl stte such tht the conctenton o the lels on the pth equl x For exmple s ccepted y the prevous NFA Pth: Lels: = The regulr expresson s: * * / Fcultet Wskunde en Inormtc PAGE 12 / Fcultet Wskunde en Inormtc PAGE 13 Regulr expresson NFA Input: regulr expresson r over lphet Σ Output: NFA N whch ccepts L(r) 1. r = 2. r = where Σ 1. Suppose N(s) nd N(t) re NFAs or the r.e. s nd t. r = s t. r=st N(s) N(s) N(t) N(t) Ths operton s only possle the nl stte o N(s) hs no outgong trnstons nd the strt stte o N(t) hs no ncomng trnstons / Fcultet Wskunde en Inormtc PAGE 14 / Fcultet Wskunde en Inormtc PAGE 15
5 c. r = s* N(s) d. r =(s) thenn(r) =N(s) Converson NFA DFA Regulr expresson cn e trnsormed nto NFAs DFAs cn e smulted/mplemented ecently Trnsormton o NFA nto DFA: construct DFA where ech stte represents suset o the sttes o the sttes o the NFA ter redng the nput 1 2 n the NFA s n set o sttes T, whch corresponds to one stte o the DFA / Fcultet Wskunde en Inormtc PAGE 16 / Fcultet Wskunde en Inormtc PAGE 17 Auxlry unctons: -closure(s) yelds set o NFA sttes rechle rom stte s n NFA v -trnstons only -closure(t) yelds set o NFA sttes rechle rom stte s n T v -trnstons only move(t, ) yelds set o NFA sttes rechle rom stte s n T v nput Intlly, -closure(s 0 ) s the only stte n Dsttes nd unmrked whle there s n unmrked stte T n Dsttes do mrk T; or ech nput symol do U := -closure(move(t, )) U s not n Dsttes then dd U s n unmrked stte to Dsttes; end Dtrns[T,] := U; end end / Fcultet Wskunde en Inormtc PAGE 18 / Fcultet Wskunde en Inormtc PAGE 19
6 Suset constructon (Rn & Scott) NFA = (Q, V, γ, q 0, F) NFA N or ( )* Equvlent DFA = (P(Q), V, δ, {q 0 }, F ) ) δ P(Q) V P(Q) δ(qq, ) ) = ( q:q qq : γ(q, ( )) F = {qq P(Q) qq F } δ({q 0 }, w) = set o ll sttes n whch the orgnl NFA cn e ter processng strng w / Fcultet Wskunde en Inormtc PAGE 20 / Fcultet Wskunde en Inormtc PAGE 21 A = {0, 1, 4, 5, 7} (= -closure(0)) B = {1, 2, 3, 4, 6, 7, 8} (= move({0, 1, 4, 5, 7}, )) C = {1, 2, 4, 5, 6, 7} (= move({0, 1, 4, 5, 7}, )) D = {1,2,4,5,6,7,9}(= move({1, 2, 3, 4, 6, 7, 8}, )) E = {1, 2, 4, 5, 6, 7, 10} (= move({1, 2, 3, 4, 6, 7, 9}, )) Resultng DFA A B D E Trnston tle stte A B C B B D C B C D B E E B C C / Fcultet Wskunde en Inormtc PAGE 22 / Fcultet Wskunde en Inormtc PAGE 23
7 DFA mnml DFA (MDFA) DFA = (Q, V, δ, q 0, F) equvlence relton on sttes; or ll s, t Q s t ( w : w V* : δ(s,w) F δ(t,w) F) Denton (equvlence clss o stte q) Q P(Q) ( q : q Q : (q) ={q q q } Prttonng stte set Q ccordng to relton yelds stte set Q whch s used n the mnml DFA (MDFA) (Q, V, δ, (q 0 ), F ) where ( s, : s V:δ ( (s),)) = (δ(s,)) F = { () F} LEX s scnner genertor whch trnsorms regulr expressons nto nte utomton: r.e. NFA re 0 {cton 0 } re 1 {cton 1 } 0 0 re k {cton k } strt F = { 0,, k } NFA DFA cceptng sttes hve the orm {,,,,, c, } wth correspondng cton: cton mn(,,c) k k / Fcultet Wskunde en Inormtc PAGE 24 / Fcultet Wskunde en Inormtc PAGE 25 Implementton exmples cn e ound n Secton o ppers/notes.pdpd Resoluton o mgutes Longest mtch s preerred I two lterntves recognze the sme sequence o chrcters, the lterntve occurrng rst n the speccton s chosen BEGIN [sym := egnsym] IF [sym := sym] letter.(letter dgt)* [sym := dsym] dgt.(dgt)* t t [sym := ntrepsym] := [sym := ecomessym] / Fcultet Wskunde en Inormtc PAGE 26 / Fcultet Wskunde en Inormtc PAGE 27
Homework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationOne Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
More informationflex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A
flex Regulr Expressions nd Lexicl Scnning Using flex to Build Scnner flex genertes lexicl scnners: progrms tht discover tokens. Tokens re the smllest meningful units of progrm (or other string). flex is
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationJava CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:
Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code
More informationA Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0
Strt Puse Step Noninverted Tree A Visul nd Interctive Input Automt String ccepted! 5 nodes generted. Theory Course with JFLAP 4.0 q0 even 's, even 's q2 even 's, odd 's q1 odd 's, even 's q3 odd 's, odd
More informationSolutions for Selected Exercises from Introduction to Compiler Design
Solutions for Selected Exercises from Introduction to Compiler Design Torben Æ. Mogensen Lst updte: My 30, 2011 1 Introduction This document provides solutions for selected exercises from Introduction
More informationNewton-Raphson Method of Solving a Nonlinear Equation Autar Kaw
Newton-Rphson Method o Solvng Nonlner Equton Autr Kw Ater redng ths chpter, you should be ble to:. derve the Newton-Rphson method ormul,. develop the lgorthm o the Newton-Rphson method,. use the Newton-Rphson
More informationSolution to Problem Set 1
CSE 5: Introduction to the Theory o Computtion, Winter A. Hevi nd J. Mo Solution to Prolem Set Jnury, Solution to Prolem Set.4 ). L = {w w egin with nd end with }. q q q q, d). L = {w w h length t let
More informationFORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES
FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES Introduction This compendium contins exercises out regulr lnguges for the course Forml Lnguges, Automt nd Theory of Computtion
More informationUnambiguous Recognizable Two-dimensional Languages
Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC
More informationBoolean Algebra. ECE 152A Winter 2012
Boolen Algebr ECE 52A Wnter 22 Redng Assgnent Brown nd Vrnesc 2 Introducton to Logc Crcuts 2.5 Boolen Algebr 2.5. The Venn Dgr 2.5.2 Notton nd Ternology 2.5.3 Precedence of Opertons 2.6 Synthess Usng AND,
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationRegular Languages and Finite Automata
N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationBypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University
More informationPointed Regular Expressions
Pointed Regulr Expressions Andre Asperti 1, Cludio Scerdoti Coen 1, nd Enrico Tssi 2 1 Deprtment of Computer Science, University of Bologn sperti@cs.unio.it scerdot@cs.unio.it 2 INRIA-Micorsoft tssi@cs.unio.it
More informationRegular Repair of Specifications
Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationand thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationWHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS?
WHAT HAPPES WHE YOU MIX COMPLEX UMBERS WITH PRIME UMBERS? There s n ol syng, you n t pples n ornges. Mthemtns hte n t; they love to throw pples n ornges nto foo proessor n see wht hppens. Sometmes they
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00
COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided
More informationLecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More informationLecture 5. Inner Product
Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right
More informationScanner. tokens scanner parser IR. source code. errors
Scanner source code tokens scanner parser IR errors maps characters into tokens the basic unit of syntax x = x + y; becomes = + ; character string value for a token is a lexeme
More informationDATABASDESIGN FÖR INGENJÖRER - 1056F
DATABASDESIGN FÖR INGENJÖRER - 06F Sommr 00 En introuktionskurs i tssystem http://user.it.uu.se/~ul/t-sommr0/ lt. http://www.it.uu.se/eu/course/homepge/esign/st0/ Kjell Orsorn (Rusln Fomkin) Uppsl Dtse
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationGenerating In-Line Monitors For Rabin Automata
Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationAutomated Grading of DFA Constructions
Automted Grding of DFA Constructions Rjeev Alur nd Loris D Antoni Sumit Gulwni Dileep Kini nd Mhesh Viswnthn Deprtment of Computer Science Microsoft Reserch Deprtment of Computer Science University of
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationAutomata theory. An algorithmic approach. Lecture Notes. Javier Esparza
Automt theory An lgorithmic pproch 0 Lecture Notes Jvier Esprz My 3, 2016 2 3 Plese red this! Mny yers go I don t wnt to sy how mny, it s depressing I tught course on the utomt-theoretic pproch to model
More informationCS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001
CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic
More informationWarm-up for Differential Calculus
Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationBayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationAngles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example
2.1 Angles Reognise lternte n orresponing ngles Key wors prllel lternte orresponing vertilly opposite Rememer, prllel lines re stright lines whih never meet or ross. The rrows show tht the lines re prllel
More information9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationKEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001
KEY SKILLS INFORMATION TECHNOLOGY Level 3 Question Pper 29 Jnury 9 Ferury 2001 WHAT YOU NEED This Question Pper An Answer Booklet Aess to omputer, softwre nd printer You my use ilingul ditionry Do NOT
More informationWords Symbols Diagram. abcde. a + b + c + d + e
Logi Gtes nd Properties We will e using logil opertions to uild mhines tht n do rithmeti lultions. It s useful to think of these opertions s si omponents tht n e hooked together into omplex networks. To
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More information! What can a computer do? ! What can a computer do with limited resources? ! Don't talk about specific machines or problems.
Introduction to Theoreticl CS ecture 18: Theory of Computtion Two fundmentl questions.! Wht cn computer do?! Wht cn computer do with limited resources? Generl pproch. Pentium IV running inux kernel.4.!
More information6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
More informationChapter. Contents: A Constructing decimal numbers
Chpter 9 Deimls Contents: A Construting deiml numers B Representing deiml numers C Deiml urreny D Using numer line E Ordering deimls F Rounding deiml numers G Converting deimls to frtions H Converting
More informationIncorporating Negative Values in AHP Using Rule- Based Scoring Methodology for Ranking of Sustainable Chemical Process Design Options
20 th Europen ymposum on Computer Aded Process Engneerng ECAPE20. Perucc nd G. Buzz Ferrrs (Edtors) 2010 Elsever B.V. All rghts reserved. Incorportng Negtve Vlues n AHP Usng Rule- Bsed corng Methodology
More informationString Searching. String Search. Spam Filtering. String Search
String Serch String Serching String serch: given pttern string p, find first mtch in text t. Model : cn't fford to preprocess the text. Krp-Rin Knuth-Morris-Prtt Boyer-Moore N = # chrcters in text M =
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationOn the expressive power of temporal logic
On the expressive power of temporl logic Joëlle Cohen, Dominique Perrin nd Jen-Eric Pin LITP, Pris, FRANCE Astrct We study the expressive power of liner propositionl temporl logic interpreted on finite
More information0.1 Basic Set Theory and Interval Notation
0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined
More informationOUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1)
August 31, 2015 GETTING STARTED WITH VHDL 2 Top-down design VHDL history Min elements of VHDL Entities nd rhitetures Signls nd proesses Dt types Configurtions Simultor sis The testenh onept OUTLINE 3 GAJSKI
More informationApplication for the Utah State Office of Education Secondary Science Endorsement
Appliction for the Uth Stte Office of Eduction Secondry Science Endorsement This endorsement is ttched to n Eductor License with secondry re of concentrtion. Cndidtes with n Eductor License who complete
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More informationData Compression. Lossless And Lossy Compression
Dt Compression Reduce the size of dt. ƒ Reduces storge spce nd hence storge cost. Compression rtio = originl dt size/compressed dt size ƒ Reduces time to retrieve nd trnsmit dt. Lossless And Lossy Compression
More informationthe machine and check the components
Quick Setup Guide Strt Here DCP-7055W / DCP-7057W DCP-7070DW Plese red the Sfety nd Legl ooklet first efore you set up your mchine. Then, plese red this Quick Setup Guide for the correct setup nd instlltion.
More informationIrregular Repeat Accumulate Codes 1
Irregulr epet Accumulte Codes 1 Hu Jn, Amod Khndekr, nd obert McElece Deprtment of Electrcl Engneerng, Clforn Insttute of Technology Psden, CA 9115 USA E-ml: {hu, mod, rjm}@systems.cltech.edu Abstrct:
More informationFuzzy Clustering for TV Program Classification
Fuzzy Clusterng for TV rogrm Clssfcton Yu Zhwen Northwestern olytechncl Unversty X n,.r.chn, 7007 yuzhwen77@yhoo.com.cn Gu Jnhu Northwestern olytechncl Unversty X n,.r.chn, 7007 guh@nwpu.edu.cn Zhou Xngshe
More information1. Introduction. 1.1. Texts and their processing
Chpter 1 3 21/7/97 1. Introduction 1.1. Texts nd their processing One of the simplest nd nturl types of informtion representtion is y mens of written texts. Dt to e processed often does not decompose into
More informationLearning Workflow Petri Nets
Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining
More informationThree-Phase Induction Generator Feeding a Single-Phase Electrical Distribution System - Time Domain Mathematical Model
Three-Phse Induton Genertor Feedng Sngle-Phse Eletrl Dstruton System - Tme Domn Mthemtl Model R.G. de Mendonç, MS. CEFET- GO Jtí Deentrlzed Unty Eletrotehnl Coordnton Jtí GO Brzl 763 L. Mrtns Neto, Dr.
More informationImplementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem
Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationComplexity Results in Epistemic Planning
Proceedings of the Twenty-Fourth Interntionl Joint Conference on Artificil Intelligence (IJCAI 2015) Complexity Results in Epistemic Plnning Thoms Bolnder DTU Compute Tech. University of Denmrk Copenhgen,
More informationResistive Network Analysis. The Node Voltage Method - 1
esste Network Anlyss he nlyss of n electrcl network conssts of determnng ech of the unknown rnch currents nd node oltges. A numer of methods for network nlyss he een deeloped, sed on Ohm s Lw nd Krchoff
More informationNQF Level: 2 US No: 7480
NQF Level: 2 US No: 7480 Assessment Guide Primry Agriculture Rtionl nd irrtionl numers nd numer systems Assessor:.......................................... Workplce / Compny:.................................
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationRIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS
RIGHT TRIANGLES AND THE PYTHAGOREAN TRIPLETS Known for over 500 yers is the fct tht the sum of the squres of the legs of right tringle equls the squre of the hypotenuse. Tht is +b c. A simple proof is
More informationPositive Integral Operators With Analytic Kernels
Çnky Ünverte Fen-Edeyt Fkülte, Journl of Art nd Scence Sy : 6 / Arl k 006 Potve ntegrl Opertor Wth Anlytc Kernel Cn Murt D KMEN Atrct n th pper we contruct exmple of potve defnte ntegrl kernel whch re
More informationExample A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
More informationAlgebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
More informationHow fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
More informationRatio and Proportion
Rtio nd Proportion Rtio: The onept of rtio ours frequently nd in wide vriety of wys For exmple: A newspper reports tht the rtio of Repulins to Demorts on ertin Congressionl ommittee is 3 to The student/fulty
More informationVectors. The magnitude of a vector is its length, which can be determined by Pythagoras Theorem. The magnitude of a is written as a.
Vectors mesurement which onl descries the mgnitude (i.e. size) of the oject is clled sclr quntit, e.g. Glsgow is 11 miles from irdrie. vector is quntit with mgnitude nd direction, e.g. Glsgow is 11 miles
More informationUnit 6: Exponents and Radicals
Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -
More informationLec 2: Gates and Logic
Lec 2: Gtes nd Logic Kvit Bl CS 34, Fll 28 Computer Science Cornell University Announcements Clss newsgroup creted Posted on we-pge Use it for prtner finding First ssignment is to find prtners Due this
More informationOrbits and Kepler s Laws
Obits nd Keple s Lws This web pge intoduces some of the bsic ides of obitl dynmics. It stts by descibing the bsic foce due to gvity, then consides the ntue nd shpe of obits. The next section consides how
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationLesson 4.1 Triangle Sum Conjecture
Lesson 4.1 ringle um onjecture Nme eriod te n ercises 1 9, determine the ngle mesures. 1. p, q 2., y 3., b 31 82 p 98 q 28 53 y 17 79 23 50 b 4. r, s, 5., y 6. y t t s r 100 85 100 y 30 4 7 y 31 7. s 8.
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationCS 316: Gates and Logic
CS 36: Gtes nd Logi Kvit Bl Fll 27 Computer Siene Cornell University Announements Clss newsgroup reted Posted on we-pge Use it for prtner finding First ssignment is to find prtners P nd N Trnsistors PNP
More informationQuick Guide to Lisp Implementation
isp Implementtion Hndout Pge 1 o 10 Quik Guide to isp Implementtion Representtion o si dt strutures isp dt strutures re lled S-epressions. The representtion o n S-epression n e roken into two piees, the
More information