Prepare properties in ltl

Assignment Help Basic Computer Science
Reference no: EM1347634

Q1) Let a three bit binary counter. This has three spaces for digits which can be 0 or 1. Initially all the bits are set to 0 (i.e. the counter reads 000). Incrementing the counter leads to the following sequence of readings 001, 010, 011, 100, 101, 110, 111, returning again then to 000 and so on. Let x, y and z stand for each of the bits where z represents the most significant bit (at the left hand side), y is the bit in the middle and x the least significant (at the right hand side) where x represents 1 in the right hand column and :x represents 0 in the right hand column (and similarly for y and z). For example z = T, y = F and x = F would represent 100 n the counter. Specify the three bit counter using LTL. The following are properties we may wish to try and prove are valid given the specification of the three bit counter.

(a) Eventually the counter reaches 111.

(b) It is not possible to reach a state where the counter reads 010 and in the next moment the counter reads 100.

Prepare these properties in LTL. Create a model which satisfies the specification and both the above properties.

Write a Review

Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

Determining asymptotic formula for recurrence equations

Give an asymptotic formula for each of the recurrence equations given below, using big "Θ" rather than just big "O" for better results when possible.

Flowchart for batch control tape

Design a document flow chart to depict each of given situations. Batch control tape is prepared along with set of transactions to make sure completeness of the data.

Storing and compiling a large amount of data

Because information systems are able to store and compile a large amount of data, many people worry that, their private data will end up in the wrong hands. Explain your position.

Encrypting a message by crypto device

Crypto device encrypts every message into 20 bits of ciphertext.

Comparing accuracies using test options

Compare the accuracies obtained using the three "test options": "Use training set", "cross-validation" and "percentage split".

Significance of strategic management

Explain the significance of strategic management to support telecommunications planning model.

Explaining significance of automating boundary

In System Analysis and Design: Automation Boundary - Why is the automating boundary significant?

Collecting information for data dictionary

Pproblems generated by going directly to manager with questions regarding data dictionary entries? Describe to the team member how he can better collect information for the data dictionary.

The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

Instruction cycle and finding contents of registers

Go over instruction cycle and find out contents of registers PC, AR, DR, AC, and IR for each of seven memory-reference instructions.

Explaining index number in time series analysis

What is an index number as relates to time series analysis? In a regression of a time series that states data as a function of calendar year, what requirement of regression is violated?