A unity feedback system has the loop transfer function This system is open-loop unstable. (a) Determine the range of K so that the closed-loop system is stable. (b) Sketch the root locus. (c)...
A tendon-operated robotic hand can be implemented using a pneumatic actuator [8]. The actuator can be represented by Plot the frequency response of G(jÏ). Show that the magnitude of G(jÏ)...
Sketch the Bode diagram representation of the frequency response for the transfer functions given in Problem P8.1.
The top view of a high-performance jet aircraft is shown in Figure AP7.1(a) [20]. Sketch the root locus and determine the gain K so that the ζ of the complex poles near the jÏ-axis...
A feedback system with positive feedback is shown in Figure AP7.7. The root locus for K > 0 must meet the condition Sketch the root locus for 0 KG(s)-1 / k 360 G(s) Y(s) FIGURE AP7.7 A closed-loop...
The drive motor and slide system uses the output of a tachometer mounted on the shaft of the motor as shown in Figure CDP4.1 (switch-closed option). The output voltage of the tachometer is vT =...
Consider a unity feedback system with the loop transfer function Find the bandwidth of the closed-loop system. 100
A unity feedback system has a loop transfer function Determine the phase margin and the crossover frequency. Ls) - G(o)G(6)005)1 + 0.15) 11.7
Consider the system described in state variable form by y(t) = Cx(t) where Compute the phase margin. 21. = [2 01
A robotic arm actuated at the elbow joint is shown in Figure DP7.9(a), and the control system for the actuator is shown in Figure DP7.9(b). Plot the root locus for K ¥ 0. Select Gp(s) so that the...
Consider a unity feedback system with the loop transfer function (a) Sketch the Bode diagram for K = 4. Determine (b) the gain margin, (c) the value of K required to provide a gain margin equal to 12...
A multi loop block diagram. (a) Compute the transfer function T(s) = Y(s)/R(s). (b) Determine K such that the steady-state tracking error to a unit step input R(s) = 1/s is zero. Plot the unit step...
Consider the system represented in state variable form y = [8 0]x + [0]μ Using the nyquist function, obtain the polar plot. 03
The magnitude plot of a transfer function is shown in Figure E8.5. Determine K, a, and b from the plot. Figure E8.5 Bode diagram. K(1 0.5s)(1 as) s(1s/8)( bs)( s/36) G(s) 0 dB/dec +20 dB/dec 20...
A unity feedback system has the loop transfer function Sketch the Bode plot of the loop transfer function and indicate how the magnitude 20 log |L(jÏ)| plot varies as K varies. Develop a table...
Consider the system shown in block diagram form in Figure E ll . ll . Obtain a state variable representation of the system. Determine if the system is controllable and observable. FIGURE E11.11 State...
A unity feedback system with the loop transfer function where T1 = 0.02 and T2 = 0.2 s. (a) Select a gain K so that the steady-state error for a ramp input is 10% of the magnitude of the ramp...
The state variable model of a plant to be controlled is y = [0 l]x + ~[0]u. Use state variable feedback and incorporate a command input u = -Kx + ar. Select the gains K and a so that the system has a...
A tele robot system has the matrix equations [16] and y = [1 0 2]x. (a) Determine the transfer function, G(s) = Y(s)/U(s). (b) Draw the block diagram indicating the state variables, (c) Determine...
An engineering laboratory has presented a plan to operate an Earth-orbiting satellite that is to be controlled from a ground station. A block diagram of the proposed system is shown. It takes T...
A unity feedback control system has the plant transfer function Design a PID controller of the form so that the closed-loop system has a settling time less than 1 second to a unit step input. G(s)...
An adaptive suspension vehicle uses a legged locomotion principle. The control of the leg can be represented by a unity feedback system with [12] We desire to achieve a steady-state error for a ramp...
Find a gain matrix K so that the closed-loop poles of the system y = [l -l]x are S1 = - 1 and s2 = -2 = -2. Use state feedback = -kx. -1 x + 2
A PID controller is used in the system in Figure 12.1, where The gain KD of the controller (Equation (12.33)) is limited to 200. Select a set of compensator zeros so that the pair of closed-loop...
A first-order system is given by with the initial condition x(0) = .v0. We want to design a feedback controller u = -kx such that the performance index is minimized. (a) Let A = 1. Develop a formula...
The goal is to design an elevator control system so that the elevator will move from floor to floor rapidly and stop accurately at the selected floor. The elevator will contain from one to three...
(a) For the system described in Problem P13.10, design a lag compensator Gc(s) using the methods of Chapter 10 to achieve an overshoot less than 30% and a steady-state error less than 0.01 for a ramp...
A closed-loop system with a sampler and hold, has a process transfer function Calculate and plot y{kT) for 0 20
A sampled-data system closed-loop block diagram is shown in Figure DPI 3.6. Design D{z) to such that the closed-loop system response to a unit step response has a percent overshoot P.O. 12% and a...
Develop an m-file to plot the unit step response of the system Verify graphically that the steady-state value of the output is 1. 0.2145z 0.1609 z20.75z 0.125 G(z) =
What is the difference between kernel and user mode? Explain how having two distinct modes aids in designing an operating system.
A manufacturer uses an adhesive to form a seam along the edge of the material. It is critical that the glue be applied evenly to avoid flaws; however, the speed at which the material passes beneath...
Suppose that the virtual page reference stream contains repetitions of long sequences of page references followed occasionally by a random page reference. For example, the sequence: 0, 1, ... , 511,...
A student has claimed that ''in the abstract, the basic page replacement algorithms (FIFO, LRU, optimal) are identical except for the attribute used for selecting the page to be replaced.'' (a) What...
Oliver Owl's night job at the university computing center is to change the tapes used for overnight data backups. While waiting for each tape to complete, he works on writing his thesis that proves...
Consider an application where students' records are stored in a file. The application takes a student ID as input and subsequently reads, updates, and writes the corresponding student record; this is...
A system has two processes and three identical resources. Each process needs a maximum of two resources. Is deadlock possible? Explain your answer.
A system has four processes and five allocatable resources. The current allocation and maximum needs are as follows: What is the smallest value of x for which this is a safe state? Process A Process...
The four conditions (mutual exclusion, hold and wait, no preemption and circular wait) are necessary for a resource deadlock to occur. Give an example to show that these conditions are not sufficient...
Why is migration of virtual machines from one machine to another easier than migrating processes from one machine to another?
Authentication mechanisms are divided into three categories: Something the user knows, something the user has, and something the user is. Imagine an authentication system that uses a combination of...
Explain under what situations a process may request a shared lock or an exclusive lock. What problem may a process requesting an exclusive lock suffer from?
When initializing a global variable in a multithreaded program, a common programming error is to allow a race condition where the variable can be initialized twice. Why could this be a problem?...
Modern applications must save their state to disk every time the user switches away from the application. This seems inefficient, as users may switch back to an application many times and the...
An alternative to using DLLs is to statically link each program with precisely those library procedures it actually calls, no more and no less. If this scheme were to be introduced, would it make...
Careful optimization can improve system-call performance. Consider the case in which one system call is made every 10 msec. The average time of a call is 2 msec. If the system calls can be speeded up...
What must be done to develop a Design-Specific ER model from a Presentation Layer ER model?
Given the Universal Relation Schema URS (A, B, C, G, W, X, Y, Z) and the set of FDs prevailing over URS, F {fd1, fd2, fd3, fd4, fd5}, where: a. Derive a canonical cover of F. b. Derive the candidate...
Consider the universal relation schema INVENTORY (Store#, Item, Vendor, Date, Cost, Units, Manager, Price, Sale, Size, Color, Location) and the constraint set F {fd1, fd2, fd3, fd4, fd5, fd6, fd7}...
Given the set of functional dependencies F {fd1, fd2, fd3, fd4, fd5, fd6, fd7, fd8, fd9, f10, f11} where: a. Construct the universal relation schema that includes (i.e., preserves) the set of...
Describe the six clauses that can be used in the syntax of the SQL Select statement. Which two clauses must be part of each Select statement?
This exercise is based on four different inventory relation schemas: P, Q, R, and S. An instance of each relation schema is given below, each of which reflects a different design objective. a....
Let A = A(1), A(2), . . . , A(1000) and B = B(1), B(2), . . . , B(1000) be two vectors (one-dimensional arrays) comprising 1000 numbers each that are to be added to form an array C such that C(I) =...
Given the memory contents of the IAS computer shown below, Address Contents 08A .......... 010FA210FB 08B .......... 010FA0F08D 08C .......... 020FA210FB show the assembly language code for the...
You must have completed Exercise 10 in Chapter 10 for beginning this exercise and thus have used the SQL Data Definition Language to create tables for the three relations DRIVER, TICKET_TYPE, and...
With reference to Table 2.4, we see that the relative performance of the IBM 360 Model 75 is 50 times that of the 360 Model 30, yet the instruction cycle time is only 5 times as fast. How do you...
Assume the following performance characteristics on a cache read miss: one clock cycle to send an address to main memory and four clock cycles to access a 32-bit word from main memory and transfer it...
The performance of a single-level cache system for a read operation can be characterized by the following equation: Ta = Tc + (1 - H)Tm where Ta is the average access time, Tc is the cache access...
List the following values: a. For the direct cache example of Figure 4.10: address length, number of addressable units, block size, number of blocks in main memory, number of lines in cache, size of...
What are two senses in which the term random-access memory is used?
For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101.What is the data word that was read from...
The memory of a particular microcomputer is built from 64K 1 DRAMs. According to the data sheet, the cell array of the DRAM is organized into 256 rows. Each row must be refreshed at least once every...
Figure 5.17 shows one of the early SRAMs, the 16 Ã 4 Signetics 7489 chip, which stores 16 4-bit words. a. List the mode of operation of the chip for each input pulse shown in Figure 5.17c. b....
A microprocessor scans the status of an output I/O device every 20 ms. This is accomplished by means of a timer alerting the processor every 20 ms. The interface of the device includes two ports: one...
An I/O-bound program is one that, if run alone, would spend more time waiting for I/O than using the processor. A processor-bound program is the opposite. Suppose a short-term scheduling algorithm...
Draw a figure similar to Figure 8.23 for ARM virtual memory translation when main memory is divided into sections. Virtual address 31 19 11 L2 page Ll index index inde Level 1L1) page table Main...
A program computes the row sums of an array A that is 100 by 100. Assume that the computer uses demand paging with a page size of 1000 words, and that the amount of main memory allotted for data is...
Consider a dynamic partitioning scheme. Show that, on average, the memory contains half as many holes as segments. Discuss.
Give reasons that the page size in a virtual memory system should be neither very small nor very large.
Represent the following decimal numbers in both binary sign/magnitude and twos complement using 16 bits: +512; -29.
The following numbers use the IEEE 32-bit floating-point format. What is the equivalent decimal value? a. 1 10000011 11000000000000000000000 b. 0 01111110 10100000000000000000000 c. 0 10000000...
Consider a reduced 7-bit IEEE floating-point format, with 3 bits for the exponent and 3 bits for the significand. List all 127 values.
One of the most serious errors in computer calculations occurs when two nearly equal numbers are subtracted. Consider A = 0.22288 and B = 0.22211. The computer truncates all values to four decimal...
Show how the following floating-point subtractions are performed (where significands are truncated to 4 decimal digits). Show the results in normalized form. a. 7.744 10-3 - 6.666 10-3 b. 8.844 ...
Show how the following floating-point calculations are performed (where significands are truncated to 4 decimal digits). Show the results in normalized form. a. (2.255 101) (1.234 100) b. (8.833 ...
The x86 architecture includes an instruction called Decimal Adjust after Addition (DAA).DAA performs the following sequence of instructions: if ((AL AND 0FH) >9) OR (AF = 1) then AL AL + 6; AF 1;...
Many microprocessor instruction sets include an instruction that tests a condition and sets a destination operand if the condition is true. Examples include the SETcc on the x86, the Scc on the...
Using the algorithm for converting infix to postfix defined in Appendix 10A, show the steps involved in converting the expression of Figure 10.15 into postfix. Use a presentation similar to Figure...
The tens complement of the decimal number X is defined to be 10N - X, where N is the number of decimal digits in the number. Describe the use of ten's complement representation to perform decimal...
Consider the results of Problem 10.6. Assume that M is a 16-bit memory address and that X, Y, and Z are either 16-bit addresses or 4-bit register numbers. The one-address machine uses an accumulator,...
Let the address stored in the program counter be designated by the symbol X1. The instruction stored in X1 has an address part (operand reference) X2. The operand needed to execute the instruction is...
The 16-bit Zilog Z8001 has the following general instruction format: The mode field specifies how to locate the operands from the operand fields. The w/b field is used in certain instructions to...
A PC-relative mode branch instruction is 3 bytes long. The address of the instruction, in decimal, is 256028. Determine the branch target address if the signed displacement in the instruction is -31.
The Motorola 680x0 machines include the instruction Decrement and Branch According to Condition, which has the following form: DBcc Dn, displacement where cc is one of the testable conditions, Dn is...
Redraw Figures 12.19c, assuming that the conditional branch is not taken. Figure 12.19 Branch Prediction State Diagram Not taken Predict taken Predict taken Taken Taken Not takern Not takern Predict...
Table 12.5 summarizes statistics from [MACD84] concerning branch behavior for various classes of applications. With the exception of type 1 branch behavior, there is no noticeable difference among...
Assume an 8088 is executing a program in which the probability of a program jump is 0.1. For simplicity, assume that all instructions are 2 bytes long. a. What fraction of instruction fetch bus...
A pipelined processor has a clock rate of 2.5 GHz and executes a program with 1.5 million instructions. The pipeline has five stages, and instructions are issued at a rate of one per clock cycle....
Considering the call-return pattern, how many overflows and underflows (each of which causes a register save/restore) will occur with a window size of a. 5? b. 8? c. 16?
Reorganize the code sequence in Figure 13.6d to reduce the number of NOOPs. Figure 13.6d Load rA(--M Load rBM NOOP NOOP | |E.E. I EE IEE Store MrC Branch X NOOP NOOP IEIE IE E
Consider the following loop: S: = 0; for K: = 1 to 100 do S: = S - K; A straightforward translation of this into a generic assembly language would look something like this: A compiler for a RISC...
In many cases, common machine instructions that are not listed as part of the MIPS instruction set can be synthesized with a single MIPS instruction. Show this for the following: a....
What are the key elements of a superscalar processor organization?
Your ALU can add its two input registers, and it can logically complement the bits of either input register, but it cannot subtract. Numbers are to be stored in two's complement representation. List...
List and briefly define three types of computer system organization.
What are the chief characteristics of an SMP?
What are some of the potential advantages of an SMP compared with a uniprocessor?
What are some of the key OS design issues for an SMP?
What is the difference between software and hardware cache coherent schemes?
Consider the control unit of Figure 16.7. Assume that the control memory is 24 bits wide. The control portion of the microinstruction format is divided into two fields. A micro operation field of 13...