Calculate the time needed to perform the computation

Assignment Help Computer Engineering
Reference no: EM13869162

Why are MP3 audio files and JPEG image files so much smaller and more compressed than their lossless digital counterparts? The most common algorithm for compressing digitised versions of analogue sources is the Fast Fourier Transform, or FFT. Because FFTs are so widely used, computer scientists need very efficient algorithms to calculate them.

Computations arranged in ‘butterfly' formation are one way of calculating FFTs. One butterfly-shaped computational unit is shown in Fig. 1. The output cell on top stores the sum of two numbers, while the one on the bottom stores the difference.

Fig. 1: Simple Butterfly Diagram

627_Simple Butterfly Diagram.png

A series of such units can be organized to perform multiple operations in parallel, as shown in Fig. 2, which uses 12 of the units shown in Fig. 1.
Fig 2.: Multiple Butterfly Diagram

1047_Multiple Butterfly Diagram.png

Submit a paper in which you solve the following problem:

• Assume a computational time for each butterfly in Fig. 1 to be 3 seconds. Compute the time necessary for the arrangement in Fig. 1 to perform 12 computations (without any parallelism).

• Compute the output of the network in Fig. 2, given the 8 values shown for inputs.

• Calculate the time needed to perform the computation on the 8 values shown in Fig. 2.

• Calculate the time needed for the arrangement in Fig.2 to perform the computation on 100 8-value data sets (Hint: Exploit pipelining).

Reference no: EM13869162

Questions Cloud

Major infrastructure project : Select one major infrastructure project and identify the project stakeholder groups. Discuss the tensions that may exist among the demands of the various stakeholder groups. Provide two suggestions for how you could achieve the optimal trade-off b..
What is acquisition and activation strategies in sales roadm : What is acquisition and activation strategies in sales roadmap?
Revenue recognition during production : Use the following facts of Lilac Corporation to prepare its journal entries relating to the
What is a bond indenture? : What is a bond indenture?
Calculate the time needed to perform the computation : Calculate the time needed to perform the computation on the 8 values shown in Fig. 2. Calculate the time needed for the arrangement in Fig.2 to perform the computation on 100 8-value data sets
Analysis of systems with chemical reactions : This assignment focuses on the analysis of systems with chemical reactions. Be sure to follow the requirements for homework as posted to BB.Every problem should be well-documented with a brief problem statement (don't copy from this document, brie..
Create a risk-free hedge portfolio : create a risk-free hedge portfolio
Write a c program that uses functions to perform : Write a C program that uses functions to perform the following: i) Addition of Two Matrices ii) Multiplication of Two Matrices
The company sells the item on credi : Assume the same facts as in RE18-1, except that Lilac Corporation defers the recognition of revenue to the period when the cash is received.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design phase of the project management life cycle

A project analysis, definition, design, implementation, mainatenace, and support phases. how do we find out what tasks are assigned to each phase? also provide examples.

  Dscribe your experiences related to your setup of mysql

research the capabilities of mysql.write a one to two page paper in which youdescribe your experiences related to your

  Write a matlab program that takes 2 number

Write a Matlab program that takes 2 number and choice of the user as input.

  An example of the complexities involved in the case

We know there are problems of understanding natural languages as opposed to formal programming languages. As an instance of the complexities involved in the case of natural languages, identify situations in which the question "Do you know what tim..

  What makes scope creep particularly prevalent in it projects

What makes scope creep particularly prevalent in IT projects? What specific IT project management tools can be used to control it - what are some possible factors that might cause scope creep in the given scenario?

  Design a unix shell script that searches for a text file

make a Unix shell script that searches for a text file with most occurrences of a given keyword. For instance, if I would like to search for a script with most usages of if statement, I would execute.

  Analyze and write down a comparison of c++ pointers

Use safety and convenience as the primary considerations in the comparison and also consider fixed heap-dynamics variables.

  Difference between encapsulation and information hiding

define the difference between encapsulation and information hiding. In addition, I need to explain the role both of these concepts play in helping to make designs more robust and extensible.

  Give important aspect of an operating system

What is the the most critical or useful function provided by an operating system.

  How many flip-flops are needed to implement the fsm designed

How many flip-flops are needed to implement the FSM designed  - Draw a state diagram for a finite state machine

  Why throw and handle an appropriate exception

Write down a C++ program that prompts the user to enter a length in feet and inches and outputs the equivalent length in centimeters. If the user enters a negative number or a non-digit number, throw and handle an appropriate exception and prompt ..

  The dynamic businessmodel you are supposed to include in

the dynamic businessmodel you are supposed to include in your assignment represents the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd