Engineer-to-Engineer Note

Size: px
Start display at page:

Download "Engineer-to-Engineer Note"

Transcription

1 Engineer-to-Engineer Note EE-307 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources nd or e-mil or for technicl support. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools Contributed by Jorge Mngune Rev 1 December 11, 2006 Introduction This document describes debug fetures of Blckfin processors nd the VisulDSP++ development tools. By pplying the tips below, progrmmers cn nrrow down the cuse of n encountered problem before reporting it to the Anlog Devices embedded processor support tem. This will help to solve the issue quickly. Debugging Tips nd Tricks The following topics re covered: Running n ppliction vi n emultor versus booting the ppliction. Specificlly, SDRAM initiliztion considertions re ddressed. Unlocking core B for dul-core processors. The emultor does this utomticlly; however, when code is booted in, core B must be unlocked mnully. Hrdwre errors nd softwre exceptions Blckfin processor debug fetures nd tools, including: Trce buffer Brekpoints (softwre, embedded, nd hrdwre) VDK debugging (VDK Sttus window nd VDK Stte History window) Debugging issues when cche is enbled Interrupts This EE-Note does not cover issues ssocited with troubleshooting peripherls. Emultion vs. Stndlone Booting The emultor softwre uses.xml files to configure resources such s SDRAM timing on n EZ-KIT Lite evlution bord. There re defult.xml files for ll Blckfin processors for which n evlution pltform exists (i.e., the EZ- KIT Lite bords), where definitions re creted to initilize certin registers upon emultor connection. For exmple, the following is n excerpt from the ADSP-BF537-proc.xml file for the ADSP- BF537 Blckfin processor: <register-reset-definitions> <register nme="ebiu_sdrrc" resetvlue="0x03a0" core="common" /> <register nme="ebiu_sdbctl" resetvlue="0x25" core="common" /> <register nme="ebiu_sdgctl" resetvlue="0x d" core="common" /> <register nme="ebiu_amgctl" resetvlue="0xff" core="common" /> </register-reset-definitions> Thus, when developing n ppliction for the ADSP-BF537 EZ-KIT Lite bord, the SDRAM is initilized utomticlly when the emultor softwre is invoked. However, when moving to stndlone ppliction (tht is, booting the ppliction rther thn downloding it using n emultor), it is the Copyright 2006, Anlog Devices, Inc. All rights reserved. Anlog Devices ssumes no responsibility for customer product design or the use or ppliction of customers products or for ny infringements of ptents or rights of others which my result from Anlog Devices ssistnce. All trdemrks nd logos re property of their respective holders. Informtion furnished by Anlog Devices pplictions nd development tools engineers is believed to be ccurte nd relible, however no responsibility is ssumed by Anlog Devices regrding technicl ccurcy nd topiclity of the content provided in Anlog Devices Engineer-to-Engineer Notes.

2 user s responsibility to enble the SDRAM controller if SDRAM memory is used in the system. This is ccomplished by including n initiliztion file vi the Loder pge of the Project Options dilog box pge when creting loder file. See ADSP-BF533 Blckfin Booting Process (EE-240) [1]. Another difference tht cn cuse issues when moving n ppliction from n emultor session to booting stndlone is relted to ADSP-BF561 Blckfin dul-core systems. By defult, the emultor softwre unlocks core B nd llows it to run from the beginning of L1 instruction memory. When both cores re to be used, core B must be unlocked by core A by clering bit 5 of the system reset configurtion register (SICA_SYSCR). Another issue tht sometimes occurs s result of the emultor unlocking core B is with regrd to chnging operting modes or clock frequencies. Specificlly, core B must be in the idle stte (not simply t brekpoint) when mking chnges to the PLL or voltge regultor. This cn cuse trouble if, for exmple, brekpoint is set in core B nd code is run on core A tht chnges the PLL frequency. Be sure to run code tht plces core B into the idle stte prior to chnging the PLL frequency. This cn be done using supplementl interrupts or GPIO pins. Hrdwre Errors nd Softwre Exceptions Hrdwre errors nd softwre exceptions re two specific types of events tht cn occur on Blckfin processors. Ech of these events hs seprte entry in the event vector tble (EVT). Hndlers should be instlled for ech of these events so tht they cn be trpped by using ny of the brekpoint methods described lter in this document. At tht point, the stte of the processor cn be exmined to understnd wht cused the prticulr event. The sequencer sttus register (SEQSTAT) hs two fields tht cn be used to gin more insight into the offending condition. The HWERRCAUSE field is used to identify the condition tht generted hrdwre error, nd the EXCAUSE field is used to identify the condition tht generted n exception. A hrdwre error cn be generted for vriety of resons, such s when n MMR is ccessed with the wrong word size (e.g., 16-bit MMR is ccessed s 32-bit, or vice vers) or when the core or DMA controller tries to ccess reserved or uninitilized memory spce. The RETI ddress will contin n ddress within 10 loctions of the offending loction. If hrdwre errors re enbled nd the event is serviced, the condition will cler, but the hrdwre error cuse will remin with the lst error condition. For ADSP-BF561 Blckfin dul-core processors, hrdwre errors generted by specific core will only cuse n error on tht core. If the DMA controller genertes hrdwre error, the error is sent to both cores. In ech of the hndlers (hrdwre error or exception) the HWERRCAUSE nd EXCAUSE fields cn be red to identify the cuse of the event. Alterntively, when using n emultor to debug, trp instructions cn be plced in the hndlers, such s emuxcept, so tht the processor will stop running whenever hrdwre error nd/or n exception occurs. The pproprite field in the SEQSTAT register cn then be inspected to determine the cuse of the event. Now tht the cuse of the event is known, the ddress of the offending instruction should be noted to determine when the problem occurred in the progrm. For exceptions, the return from exception register (RETX) contins the ddress of the offending instruction or the ddress of the next instruction to be executed. The ddress in RETX depends on the type of exception: service (S) or error (E). The ADSP-BF53x/BF56x Blckfin Processor Progrmming Reference [2] lists the events tht cuse exceptions, s well s their type (service or error). For convenience, this tble is included in Appendix A. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 2 of 11

3 For error type exceptions, RETX holds the ddress of the offending instruction; for service type exceptions, RETX holds the ddress of the next instruction fter tht of the offending instruction. At this point, the offending instruction cn be exmined for further insight into the problem. Is the instruction ccessing memory which hs no vlid CPLB definition? Is the instruction performing memory lod/store from/to misligned loction? Does the pointer or index register point to n invlid memory region? A brekpoint cn be set in the vicinity of the instruction tht cused the hrdwre error or exception, nd the code cn be single-stepped while observing the ddress registers (Ix or Px). Setting brekpoints nd/or stepping through the code prior to the instruction of interest sometimes chnges the behvior of the problem (i.e., the problem cn no longer be observed under these conditions). In cses like this, the brekpoint cn be plced pst the instruction of interest nd the stte of the processor cn be exmined when the brekpoint is encountered. Note tht the processor will hve vectored off to the event hndler, so the brekpoint is plced t the first instruction in the event hndler (exception hndler or hrdwre error hndler). Using the Trce Buffer A 16-slot trce buffer, vilble on Blckfin processors, llows the lst 16 non-contiguous chnges of flow (excluding zero-overhed hrdwre loops) to be cptured. The informtion in the trce buffer cn be instrumentl in determining the cuse of problem or, more importntly, in nrrowing down the problem such tht smll test cse cn be derived tht consistently shows the unexpected behvior. In the previous section, methods to identify the instruction which cuses prticulr event were described; however, in mny cses, tht sme instruction in isoltion would not exhibit the problem. It is wht hppens before the instruction is fetched nd executed (in some cses it does not mke it to the execution stge) tht is criticl in zeroing in on the root cuse. For exmple, consider n instruction tht performs memory lod using the P2 register. Immeditely before executing this instruction, n interrupt is tken, which, through bd progrmming prctice, does not sve nd restore the registers it uses. The ISR code modifies the pointer register P2 nd, upon returning from the interrupt service routine, the originl memory lod instruction is executed. However, P2 no longer points to the desired memory loction becuse it ws overwritten during n synchronous event, which could result in ny one of the events previously discussed. More subtly, the dt is written/red to/from the wrong memory. The ltter is typiclly hrder to detect. The trce buffer llows chnges of flow tht took plce before the problem occurred to be seen esily in window. It records the lst 16 pirs of discontinuities. The first entry in the pir is the source of the discontinuity (i.e., cll instruction), nd the second entry is the destintion, or trget, of the discontinuity (i.e., the first instruction of the clled function). In the bove P2 exmple, the first instruction of given trce pir would be return from interrupt instruction (RTI), nd the second entry in the pir would be the lod instruction or n instruction before it. Since the trce buffer lso shows the ddresses of the discontinuities, the ddress of the RTI instruction cn be inspected in the ISR to find tht P2 ws modified nd never restored before exiting the ISR. This ISR could be prt of scheduler of n RTOS tht the ppliction uses. Of course, the exmple discussed here is very simplistic. It could turn out tht the ISR did not implement workround to known issue. There will be times when nothing is pprent (i.e., with ll this nlysis, why the problem occurs still cnnot be explined). Knowing the trnsitions tht took plce before the problem ws encountered cn help crete smll test cse, which cn be very helpful to the support Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 3 of 11

4 tem to quickly investigte nd resolve the problem. Figure 1 shows how entries re structured in trce buffer. The leftmost column lists the cycles from 0 to 31. Cycles 0 nd 1 re the lst pir of discontinuities recorded in the trce buffer, cycles 2 nd 3 re the penultimte pir, etc. The second column from the left shows the grouping of the pirs. For exmple, cycles 0 nd 1 re the 15th pir (0xf), cycles 2 nd 3 re the 14th pir (0xe), nd cycles 0x1e nd 0x1f re the zero pir (0x0). The first instruction of the pir is the source of the discontinuity, nd the second instruction is the destintion of the discontinuity. For the 0xf pir, cycle 0 is the source ddress (the RTS instruction), nd cycle 1 is the destintion instruction (CALL Initilize 3VDKFv). Tht is, this instruction is executed first fter returning from the subroutine ending t ddress 0xff086be. execution hlts when tht line of code is hit. However, behind the scenes, the vlue of the loction where the brekpoint is plced is cched within the emultor. The emultor reds the memory t the brekpoint loction nd sves it to the emultor s internl brekpoint list. When the ppliction is run, it plces trp instruction t tht loction. When ny brekpoint is hit, or ny hlt event occurs, the trp instruction t the brekpoint loction is replced by the instruction tht ws previously cched. Clerly, this suggests tht softwre brekpoints re intrusive in nture. Thus, mny encountered problems my seem to go wy when softwre brekpoints re used to dignose the problem becuse the timing of the ppliction hs chnged due to the nture of softwre brekpoints. Figure 2 shows wht softwre brekpoint looks like in VisulDSP++ IDDE session. Figure 2. Softwre Brekpoint Exmple Figure 1. Trce Buffer Exmple Using Brekpoints This section describes differences between softwre, embedded, nd hrdwre brekpoints, nd explins when nd how to use them. Softwre Brekpoints Softwre brekpoints re convenient nd esy to use. Simply double-click on n instruction in the editor (source) window or the Disssembly window of the IDDE to set the brekpoint, nd Embedded Brekpoints An embedded brekpoint is prt of the ppliction code itself. It is similr to softwre brekpoints, except tht the debugger does not need to look up brekpoint tble list or insert hlting op-codes into the ppliction. As such, this clss of brekpoints is qusi-non-intrusive. The emuexcpt instruction cuses the processor to hlt when executed. This instruction only hs mening when n emultor is connected; otherwise, it cts s NOP. It is good prctice to use embedded brekpoints inside event hndlers becuse, other thn using code spce, they do not ffect the timing of the ppliction, thus llowing for the stte of the processor to be observed confidently soon fter the event occurred. Used in conjunction with the trce buffer informtion, Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 4 of 11

5 now you cn observe the stte of the processor nd cn lso observe the trnsitions tht took plce right before n event occurred. Figure 3 shows n exmple of n embedded brekpoint. Figure 3. Embedded Brekpoint Exmple Hrdwre Brekpoints On the other hnd, hrdwre brekpoints re completely non-intrusive, s they do not lter the ppliction code in ny wy. Insted, hrdwre brekpoints rely on physicl hrdwre logic on the chip, which monitors both the instruction nd dt buses. On Blckfin processors, hrdwre brekpoints re implemented by the wtchpoint register unit. There re six instruction wtchpoint registers nd two dt wtchpoint registers. Instruction hrdwre brekpoints cn be set on six specific instruction ddresses or on three instruction ddress rnges. Dt hrdwre brekpoints cn be set on two specific dt ddresses or on one dt ddress rnge. Hrdwre brekpoints cn be used in RAM or ROM types of memory. To enble hrdwre brekpoints from within the VisulDSP++ IDDE, go to Settings nd select Hrdwre Brekpoints. Figure 4 shows one of the Instruction pges of the Hrdwre Brekpoints window. Figure 4. Hrdwre Brekpoints (Instruction) The instruction ddress or ddress rnge cn then be specified to force hlts to the processor when these instructions re bout to be executed. For dt ccesses, the type of ccess must be specified (red, write, or both), to trigger n emultion hlt. Figure 5 shows the Dt pge of the Hrdwre Brekpoints window. Figure 5. Hrdwre Brekpoints (Dt) The code cn then be run, nd the processor will hlt if mtch is seen between the internl instruction/dt ddress bus nd the ddress specified in the hrdwre brekpoint registers. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 5 of 11

6 Hrdwre brekpoints provide skip count feture, which cn be used to indicte how mny times to ignore ccesses to the specified region before the processor is hlted. For exmple, if skip count is set to 0xA, the processor will hlt on the 10 th occurrence of the ddress mtch. VisulDSP++ Kernel (VDK) VDK is rel-time kernel tht simplifies the mngement of projects with multiple tsks. However, it dds level of bstrction to the ppliction. Due to this, just like ny RTOS, it mkes it tht much hrder to pinpoint bugs in the system. VisulDSP++ hs kernel-wre debugger tht cn disply system performnce detils, which cn help in ppliction tuning nd in debugging n RTOS-bsed system. It llows you to visulize the vrious threds t ny given time (i.e., running, blocked, redy, etc.). Among other debug needs, this my be instrumentl in identifying why prticulr thred never gets to run. Figure 6 shows the VDK Stte History window. Ensure tht thred priorities re set ppropritely. You should know ech tsk s needs in terms of run time. The VDK Stte History window cn be instrumentl in identifying overll thred time blncing. Another useful debug window, the VDK Sttus window, displys the cuse of kernel pnic error. Figure 7 shows the VDK Sttus window. Figure 7. VDK Sttus Window The exmple in Figure 7 shows stck overflow, which cused the kernel pnic. The indicted Vlue identifies the thred (IDLE thred) whose stck size is insufficient. Cche-Relted Issues When cche problem is suspected, first consult the pproprite processor nomly list to verify whether the prticulr observed behvior hs been chrcterized there. Figure 6. VDK Stte History Window If the unexpected behvior does not pper to be relted to known issue, try to rule out the cche controller s the cuse by moving the region of interest into L1 memory. The previous sections showed how to identify this region. Run the ppliction with cche turned on, nd then run it second time with cche turned off. Observe ny differences in behvior. If the problem is still present with the cche turned off, it could indicte rce condition in the softwre ppliction. Turning cche off my chnge the timing for the rest of the ppliction, cusing the filure to stop occurring. Becuse of this, try Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 6 of 11

7 bringing the region of interest into L1 nd leve the cche turned on. If the problem persists nd n exception nd/or hrdwre error is generted in the region of the code tht is in L1, it is not cche integrity issue. If exceptions re present, refer to Hrdwre Errors nd Softwre Exceptions bove. Cche Coherency Blckfin processors do not mintin coherency between cche memory nd min memory. Typiclly, coherency will be n issue in systems where peripherl DMA chnnel ccesses region of externl memory defined s ccheble. The cche controller hs no knowledge of these ccesses nd, s result, my use its stle (old) dt for computtions, thus producing unexpected results. Softwre must ensure tht coherency is mintined by invlidting lines tht might hve been ccessed by DMA controller. Interrupt-Relted Issues In the ISR, ensure tht the pushing nd popping of resources is done in the correct order. Also, note the significnce of pushing nd popping RETI. When RETI is pushed onto the stck, interrupt nesting is enbled; conversely, popping RETI disbles interrupt nesting. So, if higher priority interrupts should not interrupt the interrupt service routine, do not push RETI onto the stck. If progrmming in C/C++, use the nonnested interrupt hndler: EX_INTERRUPT_HANDLER(Timer_hndler) If interrupt nesting should be enbled for prticulr ISR, use the following interrupt hndler: EX_REENTRANT_HANDLER(Timer_hndler) This reentrnt hndler pushes RETI t the beginning of the ISR nd pops it t the end, right before the RTI is executed. To prevent repeted vectoring to the sme ISR, cler the cuse of the interrupt in the ISR before exiting. For exmple, for core timer, clering the TINT (timer interrupt) bit in the core timer control register will cler the interrupt. When using nested interrupts, be sure to void problems tht my rise due to using shred resources. Minimizing n ISR s execution time llows lower-priority ISRs to lso be serviced in timely mnner. Keeping ISRs short lso reduces the number of used resources within the ISR, thus lleviting stck usge. Another type of problem tht rises with nested interrupts is stck overflow. One wy to detect stck overflow in nested interrupts (or even in deeply nested subroutines) is to red the stck pointer (SP) t the beginning of every ISR to check if the pointer is nering the end of the stck. Summry This EE-Note describes VDK tools nd Blckfin processor fetures tht re vilble to help nrrow down problems. First nd foremost, lwys check the nomly list for the silicon revision of the processor used to verify whether the problem is lredy known. If it is, implement the given workround. To get utomted softwre support for known silicon errt, ensure tht the ltest tools re being used nd tht silicon workrounds re enbled. Applictions should instll event hndlers (exception hndlers, interrupt hndlers) before running the min ppliction so you cn trp events when necessry. Verify the behvior. Wht exctly is not working properly? Are exceptions/hrdwre errors being generted? If so, wht exception nd/or hrdwre error? The tbles in Appendix A will help determine this. Are the peripherls overflowing/underflowing? Are DMA errors being generted? Find wys to increse repetbility. Although not lwys possible, incresing the frequency with which problem occurs enhnces the chnce of Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 7 of 11

8 fixing the problem. Incresing repetbility could men incresing or shortening loop itertions, chnging the core voltge, djusting the core nd/or system frequencies, etc. It should be noted tht only one vrible should be chnged t time. If the modified vrible hs no effect on the bug, leve the vrible s it ws before new modifiction is mde. Use softwre brekpoints to observe processor stte prior to the triggering of the fult. If the filure stops occurring when softwre brekpoints re inserted, then either use embedded or, ultimtely, hrdwre brekpoints. If hrdwre errors/exceptions re generted, find the respective cuses from the sequencer sttus register nd check the tbles in Appendix A to see wht might hve generted those events. Trp the events in the respective exception hndlers by using embedded brekpoints or hrdwre brekpoints. Use the Trce window to observe processor trnsitions prior to the occurrence of the problem. Sve ll registers for post nlysis by choosing Register->Sve Registers in VisulDSP++, s shown in Figure 8. Figure 8. Sve Registers Feture If, fter the steps described bove, the fult cnnot be corrected, hving the knowledge of the sequence of events tht triggers the unexpected behvior should llow for smll test cse to be generted. Once test cse is vilble, summrize your findings for the embedded processor support tem nd include the test cse. This will llow for rpid reproduction of the issue, which will ultimtely help get the issue resolved. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 8 of 11

9 Appendix A Tble 1. Events tht Cuse Exceptions Exception Force Exception instruction EXCPT with 4-bit m field EXCAUS E [5:0] Type: Error (E) Service (S) Notes/Exmples m field S Instruction provides 4 bits of EXCAUSE. Single step 0x10 S When the processor is in single step mode, every instruction genertes n exception. Primrily used for debugging. Exception cused by trce buffer full condition 0x11 S The processor tkes this exception when the trce buffer overflows (only when enbled by the Trce Unit Control register). Undefined instruction 0x21 E My be used to emulte instructions tht re not defined for prticulr processor implementtion. Illegl instruction combintion Dt ccess CPLB protection violtion Dt ccess misligned ddress violtion 0x22 E See section for multi-issue rules in the ADSP-BF53x/BF56x Blckfin Processor Progrmming Reference. 0x23 E Attempted red or write to Supervisor resource, or illegl dt memory ccess. Supervisor resources re registers nd instructions tht re reserved for Supervisor use: Supervisor only registers, ll MMRs, nd Supervisor only instructions. (A simultneous, dul ccess to two MMRs using the dt ddress genertors genertes this type of exception.) In ddition, this entry is used to signl protection violtion cused by disllowed memory ccess, nd it is defined by the Memory Mngement Unit (MMU) cchebility protection lookside buffer (CPLB). 0x24 E Attempted misligned dt memory or dt cche ccess. Unrecoverble event 0x25 E For exmple, n exception generted while processing previous exception. Dt ccess CPLB miss Dt ccess multiple CPLB hits Exception cused by n emultion wtch-point mtch 0x26 E Used by the MMU to signl CPLB miss on dt ccess. 0x27 E More thn one CPLB entry mtches dt fetch ddress. 0x28 E There is wtchpoint mtch, nd one of the EMUSW bits in the Wtchpoint Instruction Address Control (WPIACTL) register is set. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 9 of 11

10 Instruction fetch misligned ddress violtion Instruction fetch CPLB protection violtion Instruction fetch CPLB miss Instruction fetch multiple CPLB hits Illegl use of supervisor resource 0x2A E Attempted misligned instruction cche fetch. On misligned instruction fetch exception, the return ddress provided in RETX is the destintion ddress which is misligned, rther thn the ddress of the offending instruction. For exmple, if n indirect brnch to misligned ddress held in P0 is ttempted, the return ddress in RETX is equl to P0, rther thn to the ddress of the brnch instruction. (Note this exception cn never be generted from PC-reltive brnches, only from indirect brnches.) 0x2B E Illegl instruction fetch ccess (memory protection violtion). 0x2C E CPLB miss on n instruction fetch. 0x2D E More thn one CPLB entry mtches instruction fetch ddress. 0x2E E Attempted to use Supervisor register or instruction from User mode. Supervisor resources re registers nd instructions tht re reserved for Supervisor use: Supervisor only registers, ll MMRs, nd Supervisor only instructions. Tble 2. Hrdwre Conditions Cusing Hrdwre Error Interrupts Hrdwre Condition HWERRCAUS E(Hexdeciml) Notes / Exmples System MMR Error 0x02 An error cn occur if n invlid System MMR loction is ccessed, if 32-bit register is ccessed with 16-bit instruction, or if 16-bit register is ccessed with 32-bit instruction. Externl Memory Addressing Error 0x03 Performnce Monitor Overflow 0x12 RAISE 5 instruction 0x18 Softwre issued RAISE 5 instruction to invoke the Hrdwre Error Interrupt (IVHW). Reserved All other vlues. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 10 of 11

11 References [1] ADSP-BF533 Blckfin Booting Process (EE-240). Rev 3. Jnury Anlog Devices, Inc. [2] ADSP-BF53x/ADSP-BF56x Progrmming Reference. Rev 1. My Anlog Devices, Inc. Document History Revision Rev 1 December 11, 2006 by J. Mngune Description Initil Relese. Blckfin Processor Troubleshooting Tips Using VisulDSP++ Tools (EE-307) Pge 11 of 11

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-56 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007 trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

CallPilot 100/150 Upgrade Addendum

CallPilot 100/150 Upgrade Addendum CllPilot 100/150 Relese 3.0 Softwre Upgrde Addendum Instlling new softwre onto the CllPilot 100/150 Feture Crtridge CllPilot 100/150 Upgrde Addendum Prerequisites lptop or desktop computer tht cn ccept

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

STRM Log Manager Installation Guide

STRM Log Manager Installation Guide Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

UNLOCKING TECHNOLOGY IVECO

UNLOCKING TECHNOLOGY IVECO UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Prescriptive Program Rebate Application

Prescriptive Program Rebate Application Prescriptive Progrm Rebte Appliction Check the pproprite progrm box for your rebte. OID Internl Use Only Cooling FSO (Fluid System Optimiztion) Foodservice Equipment Heting Lighting Motors & Drives Customer

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors ProfileMe: Hrdwre Support for Instruction-Level Profiling on Out-of-Order Processors Jeffrey Den Jmes E. Hicks Crl A. Wldspurger Willim E. Weihl George Chrysos Digitl Equipment Corportion Abstrct Profile

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Version X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510

Version X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510 Relese Note Version X3510 Version X3510 Product: 24online Relese Number: X3510 Customer Support: For more informtion or support, plese visit us t www.24onlinebilling.com or emil support@24onlinebilling.com

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Object Semantics. 6.170 Lecture 2

Object Semantics. 6.170 Lecture 2 Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information