Megaflops, gigaflops, teraflops and petaflops, Computer Engineering

Speed in scientific computing is measured in megaflops, gigaflops, teraflops and petaflops. A megaflop is 106 floating point arithmetic operations (+, -, *, /) in one second What are a gigaflop, a teraflop and a petaflop? To determine the real megaflop rate of a given algorithm on a given computer you must first determine theoretically the total number of Floating point arithmetic operations the algorithm takes and then divide that by 106 times the total time taken to run the algorithm. Determine the speed of your matrix inverse function by timing how long it takes to invert a random matrix (you should use the function given in lecture to generate a random square matrix) of size N, where N takes the integer values:

i. 2 < N < 50, (~50 values)

ii. N = {55, 60, 65, ... 200} (~30 values in increments of 5)

iii. N = {225, 250, 275, ... 1000} (~30 value in increments of 25)

iv. N = {1200, 1400, ...,2000} (~10 values in increments of 200)

Plot Megaflops vs. ln2(N).

Posted Date: 4/1/2013 3:34:51 AM | Location : United States







Related Discussions:- Megaflops, gigaflops, teraflops and petaflops, Assignment Help, Ask Question on Megaflops, gigaflops, teraflops and petaflops, Get Answer, Expert's Help, Megaflops, gigaflops, teraflops and petaflops Discussions

Write discussion on Megaflops, gigaflops, teraflops and petaflops
Your posts are moderated
Related Questions
What are the main differences between OSI and TCP/ IP reference models? Explain briefly. We will be considering only on the key differences among the two references models. Th

Poor human support - Obstacle to Information System The full utility of an IS will only be realised if it is properly supported by the users. Technology is never a solution in

Simplify the Boolean expression F = C(B + C)(A + B + C). Ans. Simplification of the given Boolean Expression F = C (B +C) (A+B+C) given as F = C (B+C) (A+B+C) = CB + CC [(A+B+C

What is application analysis? The purpose of analysis is to understand the problem so that a correct design can be constructed. The application analysis focuses on major applic

procedure of turning machine operation on markov algorithm

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

write alp to perform bcd addition without using procedure

Q. How does computer know that overflow has happened? Illustration: Add numbers 65 and 75 in 8 bit register in signed 2's complement notation.  Here expected result is

Illustrate about the single inheritance During inheritance, superclass feature may by override by a subclass defining that feature with the same name. The overriding features (

How does an authentication system differ from a firewall in functioning?   Authentication vs. firewall User Authentication and Authorization A significant advanced fi