Two carts with negligible rolling friction are connected as shown in Figure E3.16. An input force is u(t). The output is the position of cart 2, that is, y(t) = q(t). Determine a state space...
A system is described by its transfer function (a) Determine a state variable model. (b) Determine Φ(t), the state transition matrix. 8(s 5 Y(s) R(s) = T(s)--12s2 + 44s + 48
The dynamics of a controlled submarine are significantly different from those of an aircraft, missile, or surface ship. This difference results primarily from the moment in the vertical plane due to...
An RLC network is shown in Figure P3.3. Define the state variables as x1 = iL and x2 = vc. Obtain the state differential equation. FIGURE P3.3 RLC circuit.
A spring-mass-damper system, is used as a shock absorber for a large high-performance motorcycle. The original parameters selected are m = 1 kg, b = 9 N s/m. and k = 20 N/m. (a) Determine the system...
Consider the closed-loop control system in Figure CP3.6. (a) Determine a state variable representation of the controller. (b) Repeat part (a) for the process. (c) With the controller and process in...
An op-amp circuit can be used to generate a short pulse. The circuit shown in Figure DP4.5 can generate the pulse v0(t) = 5e-100t, t > 0, when the input v(t) is a unit step [6]. Select appropriate...
A closed-loop control system transfer function T(s) has two dominant complex conjugate poles. Sketch the region in the left-hand 5-plane where the complex poles should be located to meet the given...
A tank level regulator control is shown in Figure AP4.1(a). It is desired to regulate the level h in response to a disturbance change q3. The block diagram shows small variable changes about the...
A closed-loop speed control system is subjected to a disturbance due to a load, as shown in Figure DP4.1. The desired speed is Ïd(t) = 100 rad/s, and the load disturbance is a unit step input...
A closed-loop feedback system is shown in Figure E6.25. For what range of values of the parameters K and p is the system stable? Yis) FIGURE E6.25 and p. Closed-loop system with parameters K
A magnetic amplifier with a low-output impedance is shown in Figure P5.16 in cascade with a low-pass filter and a preamplifier. The amplifier has a high-input impedance and a gain of 1 and is used...
Electronic pacemakers for human hearts regulate the speed of the heart pump. A proposed closed-loop system that includes a pacemaker and the measurement of the heart rate is shown in Figure P5.17 [2,...
Consider the case of a navy pilot landing an aircraft on an aircraft carrier. The pilot has three basic tasks. The first task is guiding the aircraft's approach to the ship along the extended...
Consider the closed-loop system in Figure AP6.5. Suppose that all gains are positive, that is, K1 > 0, K2 > 0, K3 > 0, K4 > 0, and K5 > 0. (a) Determine the closed-loop transfer function T(s) =...
Consider the single-input, single-output system as described by x(t) = Ax(t) + Bu(t) y(t) = Cx(t) where Assume that the input is a linear combination of the states, that is, u(t) = -Kx(t) + r(t),...
A unity feedback system has the loop transfer function Find (a) The breakaway point on the real axis and the gain K for this point (b) The gain and the roots when two roots lie on the imaginary axis,...
A single-loop negative feedback system has a loop transfer function (a) Sketch the root locus for 0 ¤ K ¤ to indicate the significant features of the locus. (b) Determine the range of...
A magnetically levitated high-speed train "flies" on an air gap above its rail system, as shown in Figure AP7.2(a) [24]. The air gap control system has a unity feedback system with a loop transfer...
A spring-mass-damper system is shown in Figure AP8.1(a).The Bode diagram obtained by experimental means using a sinusoidal forcing function is shown FIGURE AP8.1 A spring-mass damper system. Spring,...
A large helicopter uses two tandem rotors rotating in opposite directions, as shown in Figure P7.33(a). The controller adjusts the tilt angle of the main rotor and thus the forward motion as shown in...
Most commercial op-amps are designed to be unity-gain stable [26]. That is, they are stable when used in a unity-gain configuration. To achieve higher bandwidth, some op-amps relax the requirement to...
For the successful development of space projects, robotics and automation will be a key technology. Autonomous and dexterous space robots can reduce the workload of astronauts and increase...
A DC motor control system with unity feedback has the form. Select K1 and K2 so that the system response has a settling time (with a 2% criterion) less than 1 second and an overshoot less than 5% for...
A mobile robot for toxic waste cleanup is shown in Figure DP9.1(a) [23]. The closed-loop speed control is represented by Figure 9.1 with H{s) = 1. The Nichols chart in Figure DP9.1(b) shows the plot...
Tliere have been significant developments in the application of robotics technology to nuclear power plant maintenance problems. Thus far, robotics technology in the nuclear industry has been used...
State whether the following signals are discrete or continuous: (a) Elevation contours on a map. (b) Temperature in a room. (c) Digital clock display. (d) The score of a basketball game. (e) The...
Suppose that a machine has 48-bit virtual addresses and 32-bit physical addresses. (a) If pages are 4 KB, how many entries are in the page table if it has only a single level? Explain. (b) Suppose...
You are given the following data about a virtual memory system: (a)The TLB can hold 1024 entries and can be accessed in 1 clock cycle (1 nsec). (b) A page table entry can be found in 100 clock cycles...
A computer has 32-bit virtual addresses and 4-KB pages. The program and data together fit in the lowest page (0-4095) The stack fits in the highest page. How many entries are needed in the page table...
Below is an execution trace of a program fragment for a computer with 512-byte pages. The program is located at address 1020, and its stack pointer is at 8192 (the stack grows toward 0). Give the...
How can the associative memory device needed for a TLB be implemented in hardware, and what are the implications of such a design for expandability?
A swapping system eliminates holes by compaction. Assuming a random distribution of many holes and many data segments and a time to read or write a 32-bit memory word of 4 nsec, about how long does...
Suppose that two processes A and B share a page that is not in memory. If process A faults on the shared page, the page table entry for process A must be updated once the page is read into memory....
Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB, 9 MB, 12 MB, and 15 MB. Which hole is taken for successive segment...
For each of the following decimal virtual addresses, compute the virtual page number and offset for a 4-KB page and for an 8 KB page: 20000, 32768, 60000.
Describe the effects of a corrupted data block for a given file for: (a) contiguous, (b) linked, and (c) indexed (or table based).
The clock interrupt handler on a certain computer requires 2 msec (including process switching overhead) per clock tick. The clock runs at 60 Hz. What fraction of the CPU is devoted to the clock?
A system simulates multiple clocks by chaining all pending clock requests together as shown in Fig. 5-30. Suppose the current time is 5000 and there are pending clock requests for time 5008, 5012,...
A bitmap terminal contains 1600 by 1200 pixels. To scroll a window, the CPU (or controller) must move all the lines of text upward by copying their bits from one part of the video RAM to another. If...
A user at a terminal issues a command to an editor to delete the word on line 5 occupying character positions 7 through and including 12. Assuming the cursor is not on line 5 when the command is...
One way to eliminate circular wait is to have rule saying that a process is entitled only to a single resource at any moment. Give an example to show that this restriction is unacceptable in many...
If a CPU issues one memory request every instruction and the computer runs at 200 MIPS, about how many CPUs will it take to saturate a 400-MHz bus? Assume that a memory reference requires one bus...
Secret-key cryptography is more efficient than public-key cryptography, but requires the sender and receiver to agree on a key in advance. Suppose that the sender and receiver have never met, but...
When must a Group by clause be used in a query?
Given the following specifications for an external cache memory: four-way set associative; line size of two 16-bit words; able to accommodate a total of 4K 32-bit words from main memory; used with a...
Another representation of binary integers that is sometimes encountered is ones complement. Positive integers are represented in the same way as sign magnitude. A negative integer is represented by...
(a) Distinguish between the focuses of COSO and CobiT. (b) List the four CobiT domains. (c) How many high-level control objectives does CobiT have? (d) Which domain has the most control objectives?...
(a) What is the definition of a VPN? (b) Why do companies transmit over the Internet? (c) Why do they transmit over untrusted wireless networks? (d) Distinguish between the three types of VPNs. (e)...
(a) Why is the word symmetric used in symmetric key encryption? (b) When two parties communicate with each other using symmetric key encryption, how many keys are used in total? (c) What type of...
(a) What is black holing? (b) Is black holing an effective defense against DoS attacks? Why? (c) How can the effects of SYN floods be mitigated? (d) What is a false opening? (e) Why is rate limiting...
a) Why do hackers attack browsers? b) What is mobile code? c) Why is it called mobile code? d) What is a client-side script? e) What is a Java applet? f) Why is Active-X dangerous? g) How do...
a) What is eavesdropping? b) Why can DoS attacks be successful even if they only increase latency slightly? c) Why is caller impersonation especially dangerous in VoIP? d) Why are hacking and malware...
a) What is case law? b) What are jurisdictions? c) What is cyberlaw? d) What are the three levels of U.S. federal courts? e) Which levels can create precedents? f) Does federal jurisdiction typically...
Repeat Exercise 4.5, but use the AIRLINE schema of Figure 3.8. In exercise 4.5 What are the referential integrity constraints that should hold on the schema? Write appropriate SQL DDL statements to...
Specify the updates of Exercise 3.11 using the SQL update commands. In exercise 3.11 (a) Insert < 'Robert', 'F', 'Scott', '943775543', '21-JUN-42', '2365 Newcastle Rd, Bellaire, TX', M, 58000,...
This exercise asks you to converting business statements into dependencies. Consider the following relation DiskDrive(serialNumber, manufacturer, model, batch, capacity, retailer). Each tuple in the...
What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a circuit-switched network?
A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the packet arrives, one other packet is halfway done being transmitted on this...
Consider the discussion in Section 1.3 of statistical multiplexing in which an example is provided with a I Mbps link. Users are generating data at a rate of 100 kbps when busy, but are busy...
Consider the GBN protocol with a sender window size of 3 and a sequence number range of 1,024. Suppose that at time t. the next in-order packet that the receiver is expecting has a sequence number of...
Describe how loops in paths can be detected in BGP.
Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone service to regional ISP D. Each ISP consists of one AS. Band C peer with...
Consider again the same scenario as in the previous problem, but suppose that packets from R6 destined for 0 are switched via R6-R4-R3, while packects from R5 destined to D are switched via...
For the multiprocessor illustrated in Figure 4.42 implementing the protocol described in Figure 4.43 and Figure 4.44, assume the following latencies: ¢ CPU read and write hits generate no stall...
Consider the relations Students, Faculty, Courses, Rooms, Enrolled, Teaches, and Meets In defined in Section 1.5.2. 1. List all the foreign key constraints among these relations. 2. Give an example...
Consider a database with the following schema: Suppliers(sid: integer, sname: string, address: string) Parts(pid: integer, pname: string, color: string) Catalog(sid: integer, pid: integer, cost:...
Is software engineering applicable when WebApps are built? If so, how might it be modified to accommodate the unique characteristics of WebApps?
Define two classes, Patient and Billing, whose objects are records for a Clinic. Derive Patient from the class Person given in Listing 8.1. A Patient record has the patient's name (defined in the...
Using a word processor, construct a nonoperational prototype for a Training Unit Project Reporting System. Include features brought up by the user stories you found. Hint: See sample screens in...
Use the Report Query feature to produce the following reports. Explain in a sentence what information the report is providing you with. a. The Undefined Elements report b. The Elements without...
Modify and print the ACCUMULATIVE HARDWARE SUBTOTALS Process entry. Add the Process Description, "Accumulate the hardware subtotals. These include the number of machines for each hardware brand."
Create the FIND SOFTWARE LOCATION decision table, representing the logic for an inquiry program for displaying all locations for a given SOFTWARE TITLE and VERSION. The conditions have been created...
Create a decision table for a batch update of the COMPUTER MASTER file. There are three types of updates: Add, Delete, and Change. The COMPUTER MASTER record must be read. If the transaction is an...
Without looking at your phone or tablet, design three sample pages for the following apps. You do not need to use a mock-up app for this assignment. Just draw them on paper. (Note that each group may...
Design the HARDWARE INVENTORY LISTING Web page, showing the computers available in each room at each campus. The CAMPUS is selected from a drop-down list displaying the CAMPUS DESCRIPTION. When the...
Design the SOFTWARE CROSS REFERENCE Web page. Refer to the repository description for the SOFTWARE CROSS REFERENCE REPORT data flow for the elements on the Web page. This Web page shows the computers...
After meeting with Cher Ware and Hy Perteks to discuss reporting needs, Anna has identified the fields for the partially completed NEW SOFTWARE INSTALLED REPORT. Design (or modify) the report to...
Both Dot and Mike need to know when new computers have been received. Create the NEW COMPUTER RECEIVED REPORT. The COMPUTER RECEIVED REPORT data flow contains the necessary elements.
Design the SOFTWARE MASTER REPORT containing pertinent information that helps Cher and Hy to locate the various copies of any software package easily. The elements necessary to produce the report are...
Design the SOFTWARE BY MACHINE screen report. Refer to the data flow repository entry for elements.
Explain why the UPGRADE SOFTWARE display screen would display machines rather than have Cher enter the machine IDs. In a paragraph, discuss why the display shows records in a CAMPUS/ROOM sequence.
Add the VENDOR entity to the diagram. The vendor warrants the computers, and the relationship between VENDOR and COMPUTER is that one VENDOR can warrant many COMPUTER(s). Add primary keys. Microsoft...
Explain in a paragraph why a phased conversion would be used to install the computer system.
After speaking with Dot Matricks and Mike Crowe, it has become apparent that the campus codes must be sortable for installing hardware and software, as well as for creating inventory sheets. Use...
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several...
Create the spreadsheet shown in Figure 14-11. Write formulas to calculate the total depreciation expense and to display the correct values in the following three columns: Age, Depreciation Rate, and...
The two most widely used billing systems are (1) pre-billing systems and (2) post-billing systems. a. Discuss the conditions under which each of these billing systems is most appropriate. b. Discuss...
How do information systems help businesses compete globally? a. Describe how globalization has increased opportunities for businesses. b. List and describe the four main ways of organizing a business...
Reloaded Games is an online games platform that powers leading massively multiplayer online games. The Reloaded platform serves more than 30 million users. The games can accommodate millions of...
Enter the InchesToCentimeters and CentimetersToInches functions from Figure 9.7 in a text file named convert.js. Then enter the text from Figure 9.8 into a new Web page (in the same location) and...
Add four new functions to your convert.js library file that convert between pounds and kilograms, and also between square feet and square meters. Note that: 1 kilogram = 2.205 pounds 1 square meter =...
Enter the ifdemo.html text from Figure 11.3 into a new Web page. Load this page, then describe how it behaves when you enter various grades in the text box. Once you have done this, modify the page...
Enter the slots.html text from Figure 11.10 into a new Web page, then load the page in the browser to verify that it behaves as described. Modify your page so that it simulates a slot machine, with...
In Chapter 9, you created a magic.html page that simulated the behavior of a Magic 8-Ball. As written, your page completely ignores the user's question while randomly selecting from a list of...
Modify your surface.html page from Exercise 9.8 so that it ensures that both the height and weight values entered by the user are positive values. If either of the values in the text boxes is less...
Imagine that users of your stats.html page would like to perform repeated experiments with the dice simulator. It would greatly help these users if they were able to reset the roll and doubles counts...
Enter the stats.html text from Figure 11.7 into a new Web page, then load the page in the browser to verify that it behaves as described. Add an additional text span to your stats.html page that...
There are six different dice combinations that add up to 7: 6-1, 5-2, 4-3, 3-4, 2-5, and 1-6, making it the most common dice roll. Add an additional text span to your stats.html page that keeps track...
In gambling circles, the combination of a 3 and 4 (in either order) is known as a natural seven. Add an additional text span to your stats.html page that keeps track of the number of natural sevens...