Thursday, April 19, 2007

Lab 10

Flowchart:

Average = 59 Above Average = 10/21
Below Aveage = 11/21 Above Average = >59
Below Average = <59

If the student had an "A", then the grade is >89.
If the student had a "B", then the grade is >74.
If the student had a "C", then the grade is >59.
If the student had a "D", then the grade is >44.
If the student had a "F", then the grade is <44.

Shannon and Hartley
Shannon entropy on average is how many yes/no questions one needs to ask to establish what the symbol is.
It can break off into segments containing one alternative or uniform distribution. The theorem establishes Shannon's channel capacity, a bound on the maximum amount of error-free digital data (that is, information) that can be transmitted over such a communication link with a specified bandwidth in the presence of the noise interference, under the assumption that the signal power is bounded. The law is named after Claude Shannon and Ralph Hartley.

Comparisons of Entropy:
Professor Mussolini had the least amount of "error", or "entropy", or "chaos" in his region with the entropy being as low as about -1. Professor Matic had the most entropy with it reaching to -.5 which is pretty high doubt. Professor Churchill was in the middle with entropy. In most cases of Mussolini, the probability was 0, Churchill with the second most cases of probability 0, and Matic had the least amount of probablility 0.

Thursday, March 29, 2007

Lab 9

My past with Microsoft Excel is vast. I have worked with Excel for a long time now and I am already aware of its powerful features. I did learn some new things today, however. For the actual regression line, I learned that you can view a linear line graph by adding trendlines. This shows the linear regression line in the graph. Using the data analysis tools in excel was somewhat familiar to me but not really. All of the information Excel gives in the end is very elongated and detailed with information that was carried out in the sheet. The m, b, and r was calculated rather efficiently using this easy tool. I will use this helpful tool in the future when dealing with graphs in Excel.

Thursday, March 22, 2007

Histogram


Histogram

Thursday, March 8, 2007

Lab 7: Logic Gates

TASK 2

When the two numbers are the same, then it produces an output of 1.
When the two numbers are different, then it produces an output of 0.
The NOT function negates the number.
A=Switch 1
B=Switch 2
C=XOR
D=NOT
E=Output

A B C D E
0 0 0 1 1
0 1 1 0 0
1 0 1 0 0
1 1 0 1 1

I could not figure out how to capture a screen shot of my circuit but the work is done saved in another file. The circuits produced results in the table above.

TASK 3

A B C D E F X Y
0 0 1 1 1 1 1 0
0 1 1 1 0 0 1 0
1 0 1 1 1 1 1 1
1 1 0 0 0 0 0 0

Again, the logic circuits I could not load to this page.
My findings were not the same.

Thursday, February 22, 2007

Converting Binary Numbers

To convert the binary number 110010101 use the following math:

(1 * 2^0) + (0 * 2^1) + (1 * 2^2) + (0 * 2^3) + (1 * 2^4) + (0 * 2^5) + (0 * 2^6) + (1*2^7) +(1 * 2^8) = 405

To convert the decimal number 529 to binary use the following math:

529 mod 2 = 1
529 / 2 = 264.5
264 mod 2 = 0
264 / 2 = 132
132 mod 2 = 0
132 / 2 = 66
66 mod 2 = 0
66 / 2 = 33
33 mod 2 = 1
33 / 2 = 16.5
16 mod 2 = 0
16 / 2 = 8
8 mod 2 = 0
8 / 2 = 4
4 mod 2 = 0
4 / 2 = 2
2 mod 2 = 0
2 / 2 = 1
1 mod 2 = 1
1 / 2 = .5
stop here because.5 rounds down to zero

thus, 529 = 1000010001

A positional number system is a numeral system in which each position is related to the next by a constant multiplier, a common ratio, called the base of that numeral system. A non-positional number system is number system that may be denoted positional systems, but that deviate in one way or another from standard positional systems.

Thursday, February 15, 2007

Unix Commands and Chapter 6

I learned about many commands in Unix. The first command that I learned was the (chsh) which changes the shell. Typing in (chsh) brings up the list of shells in the server. To choose a shell I had to type chsh /bin/bash. The second command I learned was the (whoami) which displays the current user's name. This tool is useful in identifying who is using the computer at that time. The third command I learned was the (finger) which displays information about someone else on the computer. Looking up information about other people is essential by the mechanism of the (finger) command. The fourth command I learned was the (exit) which simply logs out of the remote system.

In Chapter 6, which dealt with "Global Swarming" there is a significant element of the chaper that seemed to encompass the entire reading. This element is the act of tracing. These "electronic trails" can be tracked, analyzed, and can be compared with those laid by others. There are certain patterns that can emerge from this constant rate of making trails. Each transaction exerted through the use from a consumer imprints a trace, and this is where the patterns emerge. The global swarming was made simplified by second-generation search engines i.e. Google, which are created to crack down on the structure of links between pages. Sets of links can all be related to each other and all have records of episodes of consumer action. Thus, there is a definite link present between one or more pages in the set. The set is then put on a broader scale to ultimately link the pages in the root set. To switch gears a little bit, people are sometimes overwhelmed by the fact that they really do not what they are searching for on the hazardous crazy labyrinth that we call the internet. Combined with a listing of relevant web sites, good search engines are generated to have immediate search results that are updated listings on the spot. This should help some of the confusing aspects of the global web. Valid information is understood this way and also links to text can be placed in many areas in hyperspace. The text can be found by anyone who cares to search for them. I agree with the fact that trail-laying provides a good array of information at hand. But, these highlighted passages could be a disadvantage as well because of the fact that the rest of the text could just be ignored. The narrowing of attention to these items only is a danger. The ultimate global information sharing is essential by means of software development and testing. The use of information in computers has been a very reliable way to get fast, ready facts on the spot. Using trails combined with newer and improved search engines will greatly in the future increase the amount of information that is dispersed to the population. More efficient reliable information can be processed by the use of trails and sharing activity-sensitive software. This will enable us to press new knowledge and deploy information that will be used more efficiently and fluently.