The document provides information about Boolean algebra over 3 paragraphs. It begins with an introduction to Boolean algebra and switching algebra, noting it uses binary logic (1 and 0) to perform mathematical operations. The second paragraph discusses basic logic functions like inverters, OR, and AND gates. The third paragraph explains that Boolean expressions can be implemented as logic circuits, providing an example circuit. The document summarizes key concepts in Boolean algebra in 3 sentences or less.
Solving second order ordinary differential equations (boundary value problems) using the Least Squares Technique. Contains one numerical examples from Shah, Eldho, Desai
These notes are a basic introduction to SVM, assuming almost no prior exposure. They contain some derivations, details, and explanations that not many SVM tutorials usually delve into. Thus, they're meant to augment primary course material (textbook or lecture notes) on SVMs and to help digest the course material.
Solving second order ordinary differential equations (boundary value problems) using the Least Squares Technique. Contains one numerical examples from Shah, Eldho, Desai
These notes are a basic introduction to SVM, assuming almost no prior exposure. They contain some derivations, details, and explanations that not many SVM tutorials usually delve into. Thus, they're meant to augment primary course material (textbook or lecture notes) on SVMs and to help digest the course material.
Here I covered the cores of Apache and also discuss each and every core. Virtual host, resistance server process some protocols like HTTP, SMTP, DNS FTP, are also be highlighted.
Focus on some installing part of apache.
Revolution of Mobile Communication, from 1G to 5G CommunicationManash Kumar Mondal
Revolution of Mobile communication from the electromagnetic wave, 1G,2G so on. to 5G, Characteristic of each and every generation. Datarate, bandwidth access technology etc.
Web server, Apache webserver installing in ubuntu. History of Apache web server.Types of the virtual host. installing steps of apache. The basic functionality of apache
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
4. Number System
When we type some letters or words, the computer translates them in binary
numbers as computers can understand only binary numbers.
Decimal number system has base 10 as it uses 10 digits from 0 to 9
A value of each digit in a number can be determined using
The digit
Symbol value (is the digit value 0 to 9)
The position of the digit in the number
Increasing Power of the base (i.e. 10) occupying successive positions moving to
the left
5. Number System : Example
Number Symbol
Value
Position from
the right end
Positional
Value
Decimal
Equivalent
5 9 2
2
9
5
0
1
2
100
101
102
2*100 = 2
9*101 = 90
5*102 = 500
592
Decimal number (592):
6. Binary number system
Uses two digits, 0
and 1.
Also called base 2
number system
(110011)2 = (51)10
Number Symbol
Value
Position from
the right end
Positional
Value
Decimal
Equivalent
1 1 0 0 1 1
1
1
0
0
1
1
0
1
2
3
4
5
20
21
22
23
24
25
1*0 = 1
1*2 = 2
0*4 = 0
0*8 = 0
1*16= 16
1*32= 32
51
7. Binary number system
A Decimal number can converted into binary number by the
following methods:
• Double-Dabble Method
• Direct Method
8. Double-Dabble Method
Divide the number by 2
Write the dividend under the number . This become the new
number
Write the remainder at the right in column
Repeat these three steps until a ‘0’ is produced as a new number
Output (bottom to top).
9. Decimal to Binary
Convert decimal 17 into binary number
Step Remainder
1 Divide 17 by 2 2 17
8
1
2 Divide 8 by 2 2 8
4
0
3 Divide 4 by 2 2 4
2
0
4 Divide 2 by 2 2 2
1
0
5 Divide 1 by 2 2 1
0
1
10. Direct Method
• Write the positional values of the binary number
…. 26 25 24 23 22 21 20
…. 64 32 16 8 4 2 1
• Now compare the decimal number with position value listed above. The decimal
number lies between 32 and 64. Now place 1 at position 32.
64 32 16 8 4 2 1
1
• Subtract the positional value to the decimal number i.e ( 45-32=13)
45
11. Direct Method
64 32 16 8 4 2 1
1 45-32 =13
1 1 13-8=5
1 1 1 5-4=1
1 1 1 1 1-1=0
Place 0 at the rest of position value
0 1 0 1 1 0 1
(45)10=(101101)2
45
12. Decimal number to fractional Binary number
• Multiply the decimal fraction by 2
• Write the integer part in a column
• The fraction part become a new fraction
• Repeat step 1 to 3 until the fractional part become zero.
• Once the required number of digits (say 4) have been obtained , we
can stop.
13. Example
• Decimal number is (0.625)
Ans: (0.625)10= (0.101)2
Fractional decimal
number
Operation Product Fractional part of
product
Integer part of
product
0.625 Multiply by 2 1.250 .250 1
0.250 -do- 0.500 .500 0
0.500 -do- 1.000 0 1
14. Questions
Convert decimal 89 into equivalent binary number by using Double-
Dabble Method
(89)10= (1011001)2
Convert decimal 89 into equivalent binary number by using Direct
Method
(89)10= (1011001)2
Convert decimal 0.8125 into fractional binary number
(0.8125)10 = (0.1101)2
15. Switching Algebra
Boolean algebra or switching algebra is a system of mathematical logic
to perform different mathematical operations in binary system. These
are only two elements 1 and 0 by which all the mathematical
operations are to be performed.
16. What is a switching network?
Switching
Network
X1
Xm
X2
Z1
Zm
Z2
Combinatorial Network: A stateless network. The output is
completely determined by the values of the input.
Sequential Network: The network stores an internal
state. The output is determined by the input,
and by the internal state.
17. Logic Functions: Boolean Algebra
INVERTER
X X’
X X’
0 1
1 0
If X=0 then X’=1
If X=1 then X’=0
OR
A
B
C=A+B
A B C
0 0 0
0 1 1
1 0 1
1 1 1
If A=1 OR B=1 then C=1
otherwise C=0
A
B
C=A·B
A B C
0 0 0
0 1 0
1 0 0
1 1 1
If A=1 AND B=1 then C=1
otherwise C=0
AND
18. Boolean expressions and logic circuits
Any Boolean expression can be implemented as a logic circuit.
X = [A(C+D)]’+BE
C
D
C+D
[A(C+D)]’ [A(C+D)]’+BE
B
E
BE
A
A(C+D)
19. Basic Theorems: Operations with 0 and 1
X+0 = X
X
0
C=X
X 0 C
0 0 0
1 0 1
X+1 = 1
X
1
C=1
X 1 C
0 1 1
1 1 1
X
0
C=0
X·0 = 0
X 0 C
0 0 0
1 0 0
X
1
C=X
X·1 = X
X 1 C
0 1 0
1 1 1
22. Basic Theorems: Laws of Complementarity
X+X’ = 1
X
X’
C=1
X X’ C
0 1 1
1 0 1
X
X’
C=0
X·X’ = 0
X X’ C
0 1 0
1 0 0
23. Expression Simplification using the Basic
Theorems
X can be an arbitrarily complex expression.
Simplify the following boolean expressions as much as you can using the
basic theorems.
(AB’ + D)E + 1 =
(AB’ + D)(AB’ + D)’ =
(AB + CD) + (CD + A) + (AB + CD)’ =
(AB’ + D)E + 1 = 1
(AB’ + D)(AB’ + D)’ = 0
(AB + CD) + (CD + A) + (AB + CD)’ = 1
24. Associative Law
(X+Y)+Z = X+(Y+Z)
X Y Z X+Y (X+Y)+Z Y+Z X+(Y+Z)
0 0 0 0 0 0 0
0 0 1 0 1 1 1
0 1 0 1 1 1 1
0 1 1 1 1 1 1
1 0 0 1 1 0 1
1 0 1 1 1 1 1
1 1 0 1 1 1 1
1 1 1 1 1 1 1
X
Y
Z
C
Y
Z
X
C
25. Associative Law
(XY)Z = X(YZ)
X Y Z XY (XY)Z YZ X(YZ)
0 0 0 0 0 0 0
0 0 1 0 0 0 0
0 1 0 0 0 0 0
0 1 1 1 0 1 0
1 0 0 0 0 0 0
1 0 1 0 0 0 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
X
Y
Z
C
Y
Z
X
C
34. Second Distributive Law (A different proof)
(X + Y)(X + Z) = X(X + Z) + Y(X + Z) (using the first distributive law)
= XX + XZ + YX + YZ (using the first distributive law)
= X + XZ + YX + YZ (using the idempotent law)
= X·1 + XZ + YX + YZ (using the operation with 1 law)
= X(1 + Z + Y) + YZ (using the first distributive law)
= X·1 + YZ (using the operation with 1 law)
= X + YZ (using the operation with 1 law)
35. Simplification Theorems
(X + Y’)Y = XY
XY + Y’Y = XY + 0 = XY
XY’ + Y = X + Y
(using the second distributive law)
XY’ + Y = Y + XY’ = (Y + X)(Y + Y’)
= (Y + X)·1 = X + Y
XY + XY’ = X
XY + XY’ = X(Y + Y’) = X·1 = X
X + XY = X
X(1 + Y) = X·1 = X
(X + Y)(X + Y’) = X
(X + Y)(X + Y’) = XX + XY’ + YX + YY’
= X + X(Y’ + Y) + 0
= X + X·1
= X
X(X + Y) = X
X(X + Y) = XX + XY = X·1 + XY
= X(1 + Y) = X·1 = X
36. Examples
Simplify the following expressions:
W = [M + N’P + (R + ST)’][M + N’P + R + ST]
W = M + N’P
X = M + N’P Y = R + ST
W = (X + Y’)(X + Y)
W = XX + XY + Y’X + Y’Y
W = X·1 + XY + XY’ + 0
W = X + X(Y + Y’) = X + X·1 = X
37. Minterm
A minterm of n variables is a product of n literals in which each variable
appears exactly once in either true or complemented form, but not both. (A
literal is a variable or its complement.)
.
Each minterm has a value of 1 for exactly one combination of values of the
variables A, B, and C.
Thus if A = B = C = 0, A′B′C′ = 1;
if A = B = 0 and C = 1, A′B′C = 1;
and so forth
f(A, B, C) = m3 + m4 + m5 + m6 + m7
38. Maxterm
In general, a maxterm of n variables is a sum of n literals in which each
variable appears exactly once in either true or complemented form, but not
both.
Each maxterm has a value of 0 for exactly one combination of values for A, B,
and C. Thus, if A = B = C = 0,
A + B + C = 0; if A = B = 0 and C = 1,
A + B + C′ = 0; and so forth.
f(A, B, C) = M0 M1M2
39. What are Karnaugh maps?
Boolean algebra can be represented in a variety of ways. These include:
Boolean expressions
Truth tables
Circuit diagrams
Another method is the Karnaugh Map (also known as the K-map)
• K-maps are particularly useful for simplifying boolean expressions
K- Map
40. 2 variable K-Map
Starting with the Expression: A ∧ B
As a Truth Table this would be:
As a Circuit Diagram this would be:
A K-Map, will be a small grid with 4 boxes, one for each combination of A and B.
Each grid square has a value for A and a value for B.
To complete the K-Map for the
expression, you find the box in
the row where A is true and the
column where B is true, put a 1
in the box that is in both rows.
A B A ∧ B
0 0 0
0 1 0
1 0 0
1 1 1
1
41. 2 variable K-Map
(0,0) (0,1)
(1,0) (1,1)
One way to view a K-Map is to figure out
what the ‘address’ is for each box:
what its A and B values are for each
position
These have been written in the format (A, B)
42. 2 variable K-Map
To create a K-map for the expression: A
Place 1s in all the boxes in the row where A is true
1 1
43. 2 variable K-Map
To create a K-Map for the expression B
Place 1s in all the boxes in the column where B is true
1
1
44. 2 variable K-Map
• Expression: ~A ∧ B
• Find the row where A is false
and the column where B is true
• Place a 1 in the overlapping
position
1
45. 2 variable K-Map
• Try working backwards!
• Starting with the K-Map, interpret the results and write an expression
• Highlight the row that contains the 1
• Is it A or ~A?
• Highlight the column that contains the 1
• Is it B or ~B?
• Write down your two variables and
join them with an AND (∧)
1
1
46. 3 variable K-Map
In a 3 variable K-Map, we need to accommodate 8 possible combinations of A, B
and C
We’ll start by figuring out the ‘address’ for each position (A, B, C)
(0,0,0) (0,0,1)
(0,1,0) (0,1,1)
(1,1,0) (1,1,1)
(1,0,0) (1,0,1)