CH 9 Heap
Min-Max heap
Definition
A mix-max heap is a complete binary tree such that if it is not empty, each element has a field called key.
Alternating levels of this tree are min levels and max levels, respectively.
Let x be any node in a min-max heap. If x is on a min (max) level then the element in x has the minimum (maximum) key from among all elements in the subtree with root x. We call this node a min (max) node.
example
樹中為min-heap的部分,仍需符合min-heap的特性如圖Level 1的節點鍵值,會小於Level為3的子樹(10小於19、13、18、15)
樹中為max-heap的部份,仍需符合max-heap的特性
Mid term questions are skipped
Progress: 1,2,3,4,5,6,7,8,9,10,11,12,13 (total 13)
1. Device drivers are broadly classified into two basic categories: character devices and block devices. Please individually describe them. (10%)
Appeared in
99, 99_2, 101, 102, 104, 105_1, 105_2, 106, 108
Derivation
Please simply describe the Device Driver concepts. (10%) 103_2驅動程式,允許High-Level的軟體與硬體溝通的程式,建立了一個硬體與硬體,或硬體與軟體溝通的介面,讓device可以交換資料。
black13524 changed a year agoView mode Like Bookmark
Chapter 4: Network layer(Under Construction)
Network layer overview
transport segment from sending to receiving host
sending: encapsulates segments into datagrams
receiving: delivers segments to transport layer
network layer protocols in every host and router
router examines header field in all IP datagrams passing through it
Functions of network-layer
forwarding: move packets from router to another appropriate router
*[//]: # (這是一行註解,拿來示範給各位看的)*[//]: # (注意,因為不想讓各位互相抄襲,所以請盡量寫成英文,讓使用者自行翻譯)*[//]: # (因此不要太注意文法,如果文法不對讓你不舒服的話,請自行更正)
1. Explain the following basic requirements of information security
(a). The attacker cannot crack/decrypt/decipher the encrypt message
(b). The receiver hopes that the message was sent by sender, not forged by the other.
(c). The receiver can ensure that the message has not been tampered.
(d). The sender can not repudiate the message
2. S-boxes are important components in block ciphers such as DES or AES. In the 4x4 S-box given below(Table 1), 4 input bits are named x1, x2, x3 and x4 from left to right, and output y1, y2, y3, y4, respectively.
(a). Known-plaintext
Progress: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11*,12, 13
1. What is Embedded System? Please simply describe the “Embedded System”.
Appeared in
99, 01, 02, 03, 04, 05, 06
Answer
Any device that includes a programmable computer but not a general purpose computer
It includes input and output and control logic. It has to have a specific function.
AlisaChen changed 2 years agoView mode Like Bookmark
★109學年開始,陳裕賢已經擺明要跟學生懟著幹了。期中考古題除了必考的FSM和Python程式碼外完全不一樣,有人在導生聚反應考太難他也只是說想要換種(跟考古題不一樣)的方式考。甚至助教改鬆,他還重改扣分。
考試內容均為講義上的題目,每個圖都要記得看,上課說會考的一定會考,上課輕輕帶過的也會有可能考。講義一定要讀熟。
109-2期中考題與作業 完全沒有任何關聯 ,請以PPT講義上的內容為準備方向。
1. Suppose two hosts, A and B, are separated by 100,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the propagation speed over the link is $2.5\times10^8 meters/sec$.
a. Calculate the bandwidth‐delay product, $R\times D_{prop}$
b.Consider sending a file of 800,000 bits from Host A to Host B. Suppose the file is sent continuously as one large message. What is the maximum number of bits that will be in the link at any given time? (year 96, 97)
ANS
A
cys1204 changed 2 years agoView mode Like Bookmark
What is the general procedure of computer vision recognition paradigm?C(input from camera) -> G(grab image) -> P(preprocess) -> R(recognize)
List three Thresholding techniques
3.2 Basic Global Thresholding
3.3 Adaptive Thresholding
3.4.1 Variance-Based Thresholding
3.4.2 Entropy-Based Thresholding
Describe the main procedure of Canny Edge Detection Algorithm
題目
1. For each type of the following attacks, list all information and/or encryption/decryption programs the attacker of a cryptosystem can have?
102, 106, 107, 109
12%
Ciphertext-only attack
攻擊者僅有密文。
攻擊者有encryption/decryption program
Known-plaintext attack
iamS3an changed 2 years agoView mode Like 2 Bookmark
Chapter 2
Internal architecture
BIU (Bus Interface Unit)
Performing external bus operations
e.g. Fetch Instruction and data
EU (Execution Unit)
perform operations
BIU prefetch instructions into instruction queue
cake11298 changed 2 years agoBook mode Like Bookmark
問答題
What is softmax used for?
What are three supervised cnn model usage?
What are the three major issues you need to learn when you study a neural network model?
Network Architecture
Activation function
Learning rule
Basic CNN architecture can be divided into two stages, what are these stages? What are the functions of the corresponding two stages?
Convolutional layers+ pooling layerFeature extraction(特徵擷取)
Chapter 1 Computer Abstractions and Technology
1.1 Intro
Algorithm
Determines both the number of source-level statements and the number of I/O operations executed
Not in this class
Programming language, compiler, and architecture
Determines the number of computer instructions for each source-level statement
Setup ACL, OSPF
1. Basic setup 20%
Given a subnet 192.168.x.0/24; x is your group number.
R100 IP is 172.168.1.254; R3's IP is 172.168.1.x, WAN: 172.168.1.0/24
Web1 is web server; IP: 172.168.1.100
PC1 & S1 is in a subnet with 60 hosts; same as PC2 & S2
Go into Router5 and open CLI
Go into CopyRouter1 and open CLI
Router>en
Crescent changed 3 years agoView mode Like Bookmark
1. VLSM: 70%
Given a subnet 192.168.x.0/24, x is your group number,
R100 IP is 172.168.1.254, R3's IP is 172.168.1.x, WAN: 172.168.1.0/24
Setup VLSM for LANs of S1~S6 for the following numbers of users: S1: 60, S2: 30, S3: 6, S4: 12, S5: 12, S6: 12
Go into Router5 and open CLI
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip addr 192.168.1.1 255.255.255.192
Crescent changed 3 years agoView mode Like Bookmark