Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Butterfly permutation?
Butterfly permutation: This kind of permutation is attained by interchanging the most significant bit in address with least significant bit.
Figure: Butterfly permutation
E.g. Xn-1, Xn-2, and X1.X0 = X0 Xn-2 ....... X1 Xn-1
001↔100, 010↔010
011↔110,
An interconnection network derived from this permutation is the butterfly network. A butterfly network falls under the type of blocking networks and it doesn't permit an arbitrary connection of N inputs to N outputs without conflict. The butterfly network is customized in Benz network. The Benz network comes under non-blocking network and it is produced by combining two butterfly networks end to end, in a manner that data flows forward by one and in reverse by the other.
Think about call of two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer: The function call NUMBER_OF_PROCESORS () will return 32.
What is sensitivity list? A list of signals which trigger execution of the block when they change value. Sensitivity list indicates that when a change occurs to any one of
• Moral and Ethical Implications o Will this be safe to have on the road Will the computers on board be able to handle extreme circumstances • Hazardous conditions o Ex
A Padovan string P(n) for a natural number n is defined as: P(0) = ‘X’ P(1) = ‘Y’ P(2) = ‘Z’ P(n) = P(n-2) + P(n-3), n>2 where + denotes string concatenation. For a string of t
Explain in brief about Compact disks (CD) These are an optical storage media that have basically taken over from floppy disk. Software is now generally supplied on a CD (in for
Normal 0 false false false EN-IN X-NONE X-NONE
How can we pass selection and parameter data to a report? There are three options for passing selection and parameter data to the report. Using SUBMIT...WITH Using a rep
Compare pre-emptive and non-preemptive scheduling policies. We preempt the currently executing process in preemptive scheduling. In non-preemptive we permit the current process
What is the maximum number of fragments that can result from a single IP Datagram? Explain. To fragment a datagram for transmission across a network, a router utilizes the netw
DVD-ROM employs same principle as a CD-ROM for reading and writing. However a smaller wavelength laser beam is used. Total capacity of DVD-ROM is 8.5GB. In double-sided DVD-ROM two
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd