Describe the experiments needed to evaluate the design

Assignment Help Basic Computer Science
Reference no: EM13541293

Your job is to evaluate design alternatives for a code breaking machine to be delivered to the GSA. The code breaking machine takes a file containing encrypted text as input and outputs a file containing decrypted “plain text”. The machine is quite simple and consists of a processor, bus, memory, and I/O. You have the following design choices: An Intel multicore 32-bit processor or AMD single-core 64-bit processor, a PCI, NuBus, or HyperTransport, 10 GB of SRAM or 100 GB of FLASH plus 1 GB of SRAM, and a 1 Gb/s Ethernet link for I/O. Answer the following questions:

a) What is the workload?

b) What is the response variable? Should the value be minimized or maximized?

c) What are the factors and factor levels?

d) Describe the experiments needed to evaluate the design alternatives. Give both a full factorial design and simple design. These experiments could be conducted on a simulation model or system prototype.

Reference no: EM13541293

Questions Cloud

Determine the height of the elevator from the bottom of the : A water contains a suspended solids concentration of 10.30 mg/L. Coagulation reduces this to 1.0 mg/L. To accomplish this, an alum dose of 13.30 mg/L is necessary. What is the dry weight of sludge produced in kg/day if the plant treats water at a rat..
What is the output of the below csim program : What is the output of the below CSIM program?
What is the difference between a combination : Assume that the probability of a server failing over night is p = 0.1. If you have 1000 servers, what is the probability that 100 servers will have failed over night?
What are some additional performance metrics of interest : Suppose you have two systems. System #1 processes jobs at rate 100 jobs/sec and system #2 at a rate 150 jobs/sec. What is the speed-up and relative change of system #1 with respect to system #2?
Describe the experiments needed to evaluate the design : Describe the experiments needed to evaluate the design alternatives. Give both a full factorial design and simple design. These experiments could be conducted on a simulation model or system prototype.
What is the probability of receiving 4 messages such that : Assume that the probability of a received message having an error is 0.10 (errors are independent). What is the probability of receiving 5 good (that is, error free) messages? What is the probability of receiving 4 messages such that 1 or more messag..
Calculate how much does the point move down : A walkway suspended across a hotel lobby is supported at numerous points along its edges by a vertical cable above each point and a vertical column underneath. how much does the point move down
Determine the electric field vector amplitude : An EM wave has a wave vector k=(x+2y)rad/m. The magnetic field amplitude is Bo=(1.43x10^-10T)(2x-y+z). Determine the electric field vector amplitude
Find the speed of the ball after the ball leaves the bat : A pitcher throws a 0.140 kg baseball, and it approaches the bat at a speed of 35.0 m/s. The bat does Wnc = 75.0 J of work on the ball in hitting it. find the speed of the ball after the ball leaves the bat

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which approach to the sdlc would be most appropriate

1. Compaared to the Tradeshow application described in Chapter 1, how long might this project take, and which approach to the SDLC would be most appropriate?

  What decimal number would the ieee 754

What decimal number would the IEEE 754 single precision floating point number 0xCAE80000 (this is in hex) be? Write your final answer in scientific notation as m x 10 p where p is an integer.

  Write a query that will return the customer number

Write a query that will return the customer number

  People must be in a group in order to guarantee

How many people must be in a group in order to guarantee that two people in the group have the same birthday (don't forget leap year)?

  Give a cfg for the set of all well formed strings

Give a CFG for the set of all well formed strings over {a,b,+,.,*, ?,?,(,) } that are well formed regular expressions over {a,b}

  Determine if the string s=s1s2...sk

Suppose we want to determine if the string s=s1s2...sk is a substring much larger string a1a2...an. One approach is to compute h(s) with some hash function h.

  How much memory is required to store picture

A 1024*768 image is displayed, noninterlaced, at a rate of thirty frames per second. If the image is stored with 64k-color resolution, which uses 2 bytes per pixel, how much memory is required to store the picture?

  How management use smith systems consulting as outside

How Boardman Management Group should utilize Smith Systems Consulting as an outside consultant for this project. Include a discussion of why the specific elements of your plan are important.

  Approach appropriate for company forefront of technology

However, adopting a secondary approach where others adopt early and a firm learns from their mistakes is often a viable strategy. When is each approach most appropriate and why?

  Create two files edit your new file using gedit vi and chage

Create two files. • File1 has one line with the value of 5. • File2 has one line with the value of 100. Edit your new file using Gedit or VI and change it so it performs the following actions

  Identify the troublesome computer''s ip address and host

What commands would you use to identify the troublesome computer's ip address and host name?

  Calculate the net expected value for the project risks

Calculate the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd