Free Essay

Techniques for Copying with Soft Errors

In: Computers and Technology

Submitted By Ushnaasif
Words 1857
Pages 8
Techniques for copying with soft errors

Ushna Asif
Computer Science
Bahria University Karachi campus
Karachi, Pakistan ushnaasif99@gmail.com hajra masood
Computer Science
Bahria University Karachi campus
Karachi, Pakistan
Hajra.cs@gmail.com

Aniqa Naeem
Computer Science
Bahria University Karachi campus
Karachi, Pakistan
Aniqanaeem@yahoo.com

Abstract—This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. *CRITICAL: Do Not Use Symbols, Special Characters, or Math in Paper Title or Abstract. (Abstract)

Keywords—component; formatting; style; styling; insert (key words)

Introduction

There are many different kind of fault tolerance in computer architecture like failure in operating system and other hardware issues raised in our daily lives among them there is a soft error issues which is also called as semiconductor transient faults. This fault occurred by the cosmic rays or substrate alpha particle that can also have possibly corrupt the user data. A soft error event causes enough of a charge disturbance to reverse or flip the data state of a memory cell, register, latch, or flip-flop. [1] The error is called “soft” because the circuit/device itself is not permanently damaged by the radiation; if new data are written to the bit, the device will store it correctly. The soft error is also often referred to as a single event upset(SEU). If the radiation event is of a very high energy, more than a single bit maybe affected, creating a multi-bit upset (MBU) as opposed to the more likely single bit upset[2]

background

1 Alpha particles and cosmic rays

Alpha particles are emitted by the reaction of trace uranium and thorium impurities are added into the materials and shown cause of soft errors in DRAM devices. Alpha particle consist of two neutrons and two protons. The most natural source of containing alpha particle is 238U, 235U, and 232Th.[3] Cosmic rays are produced by neutrons reach on the ground of earth. The heavy nuclei produced by a nuclear reaction between a neutron and a silicon nucleus deposit huge amount of energy that brings about a single event upset. Thus, about 99% of soft-errors by secondary cosmic-rays are caused by cosmic-ray neutrons.[4]
[pic]

Figure 1 Fission of 10B induced by the capture of a neutron[5]

2 Single event upset(SEU)

The SEU can be defined as
“Radiation-induced errors in microelectronic circuits caused when charged particles (usually from the radiation belts or from cosmic rays) lose energy by ionizing the medium through which they pass, leaving behind a wake of electron-hole pairs”. - - - NASA Thesaurus[5]

3 soft error circuits

A serial-in/parallel-out shift register is similar to the serial-in/ serial-out shift register in that it shifts data into internal storage elements and shifts data out at the serial-out, data-out, pin. Soft error in electronic device are major issues and they occur due to radiation induced when the logical value of circuit node is alters and particles impact in circuit. Sift registers are mainly used in applications like digital filtering and alignment of signals for communication in receivers [6].

related work

|Author name and year |Techniques for|Copying |Correcting |SEU and MEU|
| |Detecting soft|soft error |Hardware | |
| |errors | |overhead | |
|Decimal Hamming: A |( |( |( |( |
|Software-Implemented | | | | |
|Technique to Cope with| | | | |
|Soft Errors (2011) [7]| | | | |
|An Efficient technique|( |( |( |( |
|to Protect Serial | | | | |
|Shift Registers | | | | |
|Against Soft Errors | | | | |
|(2013) [8] | | | | |
|A Study of Soft Error |( |( |( |( |
|Consequences in Hard | | | | |
|Disk Drives ( 2012)[9]| | | | |
|Exploiting replicated |( |( |( |( |
|Checkpoints for Soft | | | | |
|Error Detection and | | | | |
|Correction (2013)[10] | | | | |

In this paper they describe the used the overhead technique to detect and correct the soft errors by their proposed algorithm hamming codes are applied to decimal addition with the combination of different data structures like heap , linked list. Then combined overhead performance of decimal hamming of both the data structure. There result shows that decimal hamming is better than binary hamming and other checkpoints technique for detecting and correcting the error soft error.[7]

They proposed the method in which two copies of shift register for input and output. The input one copy is encoded in input phase and other in output phase. After that this copies generated an error pattern at output side which helped in distinguishing the copy in error and the correct error using output from other copy. Through this technique they showed that how to protect from soft errors caused by radiation in devices.[8]

As we all know there are various layers in hard disk for preventing data on the fault occurrence. They proposed that detect soft errors using hard error algorithms and setting a threshold which arise the alarm and user can safe their data to safe location. They compare many soft error on hard error algorithm but most of them generated false alarm. After changes threshold of the soft error occur generates better but it lots of time to compute. In the end they concluded that having large data cause computation power but generates efficient results.[9]

In this paper they remove soft error in superscalar microprocessors but using pervious designed processor that takes the copy of RAT(register alias table that holds current location of value to the register) at each instruction to recover from the error occurred. The proposed the technique of detecting and correcting the same RAT checkpoints from the same and pervious checkpoints. They showed the comparison between the 2006 benchmark that shows average RAT 25% and average checkpoints 5.66% and there result shows average RAT 41.5% . by this technique small energy consumption and less overhead in hardware.[10]

Soft errors are the system malfunctions generated due to collision of alpha particles with ICs ;this event is referred as single transient event (STE). Soft error coping techniques can based on “tolerance ” or “mitigation” .previous work mostly focus on synchronous processors but now focus is shifting towards asynchronous(of quasi-delay-insensitive (QDI) processor) .In error tolerance Triple error modular redundancy is implemented on C element or muller C gate is used to produce appropriate output wrt input in less time (robustness ) .another tolerance approach is halting based test generation method .In soft error mitigation gates of circuits are chosen by 3 strategies for soft error reduction .

1. Individual gates,

2. complete cones of state/output logic

3. partial cones of state/output logic

for soft error susceptibility assessment we implement asynchronous-circuit fault simulator[11]

Soft error in stochastic logic circuits can result greater malfunction (stochastic logic is implemented for complex computations by simple bit-wise operations on the streams.)Error analysis in stochastic logic for RESc architecture is performed in 3 steps

1. Approximation(Bernstein approximation)

2. Quantization

3. random fluctuations( randomizer generate stochastic bit streams )

In this new model of stochastic circuits computation in deterministic Boolean domain are transformed into arithmetic computation with probability . Thus it is more fault tolerant but their accuracy depends on statistical distribution of random bits[12]

Complex ,multicore and fabricated processors are more prone to transient errors. In this paper online error detection is performed. Error comes before fault so monitoring errors may help detecting faults. Error: “A difference…between a computed result and the correct result” :Fault: “An incorrect step, process, or data definition in a computer program” (IEEE610.12-90)Online Error Detection focus on Anomaly detection in which errors(anomalous behavior) are monitored to predict faults. Online Error Recovery and Repair: can be done by forward error recovery (detect and correct the errors by using redundancy ) and backward error recovery (correct the errors by switching to previous correct state which are saved periodically). Fault Detection: is done by analyzing errors ,Fault Diagnosis identify the root cause of error and then recovery is performed (forward or backward)[13]

Nano technology combined with multicore processors have increased the chances of system hardware to produce faults. The occurrence of faults is controlled by applying redundancy in information, spatial or temporal domain. Correcting Codes (ECC) are introduced for transient bit flips ; in correcting codes information redundancy is applied to mitigate soft error but it is costly in terms of power .A single event upset may result in loss of control and system failure. When alpha particle strikes with silicon chip it generates charge which can result in bit flip in memory or transient pulse in logic. Soft error mitigation defines error as “if the primary component have error which is not present in redundant component” . False errors are controlled by time and spatial redundancy. Soft error detection and recovery data is latched in registers and then comparison is performed to detect soft errors. Fault tolerance is performed with SEM cells (soft error mitigation) which deal with soft errors of high strike rate.[14]

References

1. Zhang, W., et al. An analysis of microarchitecture vulnerability to soft errors on simultaneous multithreaded architectures. in Performance Analysis of Systems & Software, 2007. ISPASS 2007. IEEE International Symposium on. 2007. IEEE.
2. Baumann, R.C., Radiation-induced soft errors in advanced semiconductor technologies. Device and Materials Reliability, IEEE Transactions on, 2005. 5(3): p. 305-316.
3. Kobayashi, H., et al., Evaluation of LSI soft errors induced by terrestrial cosmic rays and alpha particles. 2001, Technical report, Sony Corporation and RCNP Osaka University.
4. Sawamura, H., T. Hand, and T. Iguchi, Soft errors of semiconductors caused by secondary cosmic-ray neutrons. 2003.
5. Wang, F. and V.D. Agrawal. Single event upset: An embedded tutorial. in VLSI Design, 2008. VLSID 2008. 21st International Conference on. 2008. IEEE.
6. Hatamian, M., et al. Design considerations for gigabit Ethernet 1000Base-T twisted pair transceivers. in Custom Integrated Circuits Conference, 1998. Proceedings of the IEEE 1998. 1998.
7. Argyrides, C., et al. Decimal Hamming: A software-implemented technique to cope with soft errors. in Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2011 IEEE International Symposium on. 2011. IEEE.
8. Reviriego, P., et al., An Efficient Technique to Protect Serial Shift Registers Against Soft Errors. Circuits and Systems II: Express Briefs, IEEE Transactions on, 2013. 60(8): p. 512-516.
9. Tsai, T., N. Theera-Ampornpunt, and S. Bagchi. A study of soft error consequences in hard disk drives. in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on. 2012. IEEE.
10. Koc, F., et al. Exploiting replicated checkpoints for soft error detection and correction. in Proceedings of the Conference on Design, Automation and Test in Europe. 2013. EDA Consortium.
11. Almukhaizim, S., et al., Soft-error tolerance and mitigation in asynchronous burst-mode circuits. Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, 2009. 17(7): p. 869-882.
12. Qian, W., et al., An architecture for fault-tolerant computation with stochastic logic. Computers, IEEE Transactions on, 2011. 60(1): p. 93-105.
13. Gizopoulos, D., et al. Architectures for online error detection and recovery in multicore processors. in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011. 2011. IEEE.
14. Avirneni, N.D.P. and A.K. Somani, Low overhead soft error mitigation techniques for high-performance and aggressive designs. Computers, IEEE Transactions on, 2012. 61(4): p. 488-501.

Similar Documents

Premium Essay

Home Computer Security

...Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet Terms. | ARPAnet | The precursor to the Internet, ARPAnet was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPAnet served as a testbed for new networkingtechnologies, linking many universities and research centers. The first two nodes that formed the ARPAnet were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah. | attack | An action conducted by an adversary, the attacker, on a potential victim. (From the glossary of State of the Practice of Intrusion Detection Technologies.) | backdoor | Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk. | backup | Copy of files and programs made to facilitate recovery, if necessary. (From the National Information Systems Security (INFOSEC) Glossary...

Words: 3740 - Pages: 15

Free Essay

Honesty and Economics

...may not be much outright plagiarism or cheating in economics research, argues this economist, but there are grounds to conclude that a bias exists in statistical research. Does this amount to dishonesty? The author tackles the issue. T is that people try to maximize their welfare. Since dishonesty can enhance the prospect of publication, the prime success indicator in academia, economists should ask themselves whether academic economists sometimes maximize utility by being dishonest in doing or presenting their research. HE CORE ASSUMPTION OF MAINSTREAM ECONOMICS I Plagiarism, in its flagrant form of copying someone else’s work, seems rare; I can recall reading about only three confirmed cases of it in the almost sixty years I have spent as an economist. Both the risk of exposure and feelings of conscience provide plausible explanations for this scarcity. Soft plagiarism in the sense of making unacknowledged THOMAS MAYER is professor emeritus of economics at University of California–Davis. A more detailed working-paper version of this article is available at www.econ.ucdavis.edu. Challenge, vol. 52, no. 4, July/August 2009, pp. 16–24. © 2009 M.E. Sharpe, Inc. All rights reserved. ISSN 0577–5132 / 2009 $9.50 + 0.00. DOI: 10.2753/0577–5132520402 16 Challenge/July–August 2009 Honesty and Integrity in Academic Economics use of someone else’s ideas is probably much more common, both because it is considerably less likely to be detected (and the punishment, if the...

Words: 3023 - Pages: 13

Premium Essay

Marketing

...EDWARDES COLLEGE PESHAWAR Department of Professional Studies ASSIGNMENT COVER SHEET Student Name: Subject Name: Assignment #: Assignment Title: Issue Date: Date(s) Returned to Student: Student Declaration 1. I certify that this assignment is entirely my own work, except where I have given fully-documented references to the work of others, and that the material contained in this assignment has not been submitted for assessment in any formal course of study. 2. I understand the definition and consequences of plagiarism. My assignment will be cancelled and failed if it is copied from another student, book or internet website. Assignments to be submitted as per specified due dates as published in assignment briefs. Faculty policy requires that assignments are to be submitted to your lecturer/ tutor in class or in faculty office. In case of late submission please attach the late submission form, signed by the head of department or tutor. Student Signature Date: Formative Deadline: Date(s) Submitted: Summative (Final) Deadline: Subject/Unit Number: College Number: Tutor Name: Qualification: Semester: □ HND Computing □ HND Business □ EDSML For Tutor Use Only Date / Time _______________________________ Signature __________________ □ Late Submission Note: - Attach this part with your assignment x-----------------------------------------------------------------------------------------------------------------------------------------------------------------------x Edwardes...

Words: 3216 - Pages: 13

Free Essay

Important G3

...GS text for a. an answer to an examination question, b. an opening paragraph of an assignment, or c. a background (or scene-setting) paragraph to an analysis or discussion begins with one of the following a. a short or extended definition, b. a contrastive or comparative definition, or c. a generalization or purpose statement General statement – More specific detail – Specific detail – Broader statement “Writing passage begins with a definition; definitions are a common way of getting started. (unfamiliar reader – used to clarify terms / familiar reader – expected you to demonstrate your understanding of complex concepts) Sentence Definition; To what class does (Definition) belong? How is it different / would you define? (Compare / Cause) A term is (a) class wh-word/that specific detail. Indefinite article / before both the term and class Ex) Annealing is a metalworking process / A star is a celestial body A disinfectant is an/the agent capable of destroying disease causing microorganisms. An; it does not refer to a particular representative. The; indentifies or describes the term, some previous mention of other agents. The distinguishing information in the restrictive relative clause - one involves a simple deletion / the other involves a change in word form or an entire word. 1) Enamel, in dentistry, is a hard, white inorganic material (that is) on the crown of a tooth. : the verb to be 2) A collagen is a white, inelastic protein (that...

Words: 5740 - Pages: 23

Premium Essay

It Notes for Business

...ADVANCED COMPUTER APPLICATIONS MODULE DEFINE A COMPUTER * An electronic machine that works under the control of stored programs to accept, process & output data/information for use by the operator. * A device that accepts data, processes the data in accordance with a stored program, generates results, and usually consists of input, output, storage, and arithmetic, logic, and control units. * A functional unit that can perform substantial computation, including numerous arithmetic operations or logic operations, without human intervention during a run. * It is an electronic device/machine that accepts data (raw facts & figures) as input and processes (works on it) to produce information (data converted to meaningful form) as output. The computer is made up of hardware, software and peripheral devices. Hardware- refers to the tangible, physical and mechanical components of a computer. Software- refers to the intangible computer components, which are the programs or instructions of the computer. Everything that a computer does, it acts under instructions written out as computer programs. The hardware needs these instructions to function Computer program: * A set of instructions, written in a specific programming language, which a computer follows in processing data, performing an operation, or solving a logical problem. See also software. * A computer program is a set of statements or instructions to be used directly or indirectly in a computer...

Words: 59334 - Pages: 238

Premium Essay

Human Resource Planning

...here to enter text.” | “Date” | “Click here or from” “the dropdown to” “enter a date.” | “Indicative” “Mark %” | “Click here to enter” “percentage” | “Second Assessor’s Initials” | “Click here to enter text.” | “Date” | “Click here or from” “the dropdown to” “enter a date.” | “(Subject to Module Board Agreement)”“(Before any penalty applied)” | “Plagiarism Declaration”“I declare that the work that I am submitting for assessment contains no section copied in whole or in part from any other source unless it is explicitly identified by means of quotation marks. I declare that I have also acknowledged such quotations by providing detailed references in an approved format. I understand that either or both unidentified and unreferenced copying constitute plagiarism, which is one of a number of very serious offences under the University’s Code of Practice on the Use of Unfair Means. (Information on the Code of Practice is available from the online student handbook – www.hull.ac.uk/handbook) I declare that the work I...

Words: 2774 - Pages: 12

Free Essay

Linux System Programming

...LINUX System Programming Other Linux resources from O’Reilly Related titles Building Embedded Linux Systems Designing Embedded Hardware Linux Device Drivers Linux Kernel in a Nutshell Programming Embedded Systems Running Linux Understanding Linux Network Internals Understanding the Linux Kernel Linux Books Resource Center linux.oreilly.com is a complete catalog of O’Reilly’s books on Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web platform: Linux, Apache, MySQL and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or simply flip to the page you need. Try it today for free. LINUX System Programming Robert Love Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux System Programming by Robert Love Copyright...

Words: 125679 - Pages: 503

Premium Essay

Biology of Mind Notes

...Textbook: i. The Need for Psychological Science a) Did We Know It All Along? Hindsight Bias i. Hindsight bias = Something has happened makes it seem inevitable ii. Not because common sense is usually wrong, but because common sense more easily describes what has happened than what will happen b) Overconfidence iii. We tend to think we know more than we do c) The Scientific Attitude iv. Curiosity 1. Empirical approach v. Skepticism = persistently asking two questions: What do you mean? How do you know? 2. Scientific attitude: being skeptical but not cynical, open but not gullible vi. Humility = an awareness of our own vulnerability to error and an openness to surprises and new perspectives d) Critical Thinking ii. How Do Psychologists Ask and Answer Questions? e) The Scientific Method vii. A scientific theory explains through an integrated set of principles that organizes observations and predicts behaviour or events. viii. Hypotheses ix. We should be aware that it can bias subjective observations x. Operational functions = a statement of the procedures used to define research variables. For example, human intelligence may be operationally defined as what an intelligence test xi. Replicate – repeat xii. Finally – organizepredictionsrevised theory xiii. We can test our hypotheses and refine...

Words: 4656 - Pages: 19

Free Essay

Stuff That Is Useless

...Module Information Booklet Taylor’s University Taylor’s Business School Degree Programmes August Semester 2014 UCM60502U2 Understanding Information Systems For Businesses Contents Introduction Module Overview Learning Resources Assessments Resit Assessments Assessment Offences Extenuating Circumstances Assignment and Guidelines Module Calendar Assignment Cover Assignment Feedback Form Introduction Welcome Welcome to Understanding Information Systems for Businesses (UIS). This module emphasizes on the importance of information systems in business today and how they have transformed businesses on the world stage. Learner will gain an appreciation of how information systems have strategic impacts for organisations and their people, particularly with the increasing prevalence of global networked systems. To successfully complete this module, learners have to be intentional and responsible in their own learning. Learners are expected to be receptive to online tutorials by participating in discussion forums, and other e-learning approaches. In addition, learners are to read the prescribed textbook chapters, complete weekly assigned work including group assignment, and participate in online tutorial forum weekly. Dr. Choo Wou Onn Senior Lecturer Contact details Lecturer cum Tutor Dr. Choo Wou Onn Room No...

Words: 3277 - Pages: 14

Free Essay

Bamboo

...Contents Index 1 User’s manual for Windows & Macintosh ® ® Using a pen Customizing your pen Troubleshooting Using a tablet Customizing your tablet Digital inking Contents Index 1 Contents Index 2 Bamboo™ User’s Manual for Windows® & Macintosh® English version 1.2, March 03, 2008 Copyright © Wacom Company, Limited, 2008 All rights reserved. No part of this manual may be reproduced except for your express personal use. Wacom reserves the right to revise this publication without obligation to provide notification of such changes. Wacom does its best to provide current and accurate information in this manual. However, Wacom reserves the right to change any specifications and product configurations at its discretion, without prior notice and without obligation to include such changes in this manual. Reuse, recycling, and recovery. You are urged to recycle this product when replacing it with a newer product or when it has outlived its useful life by bringing it to an appropriate collection point for recyclable materials in your community or region. By doing this, you can help improve the environment of your community as well as minimize the potential negative effects created should any hazardous substance that may possibly be present within waste material reach the environment during the disposal process. Within the European Union, users are required not to dispose of Waste Electrical and Electronic Equipment (WEEE) as unsorted...

Words: 15849 - Pages: 64

Premium Essay

Mbaar

...Managing Business Activities to Achieve Results Yuvraj  Minawala   Rims International School Of Business And Technology BBA Second Year: Higher National Diploma (HND)               HND - ASSIGNMENT BRIEF LEARNER NAME ASSESSOR NAME QUALIFICATION Yuvraj Minawala Shweta Singh 5 Managing Business Activities to Achieve results   UNIT NUMBER AND TITLE J/601/0946 08.04.2013 10.05.2013 HAND OUT DATE HAND IN DATE RULES & REGULATION Plagiarism is presenting somebody else’s work as your own. It includes copying information directly from the Web or books without referencing the material, submitting joint coursework as an individual effort, copying another student’s coursework, stealing coursework from another student and submitting it as your own work. Suspected plagiarism will be investigated and if found to have occurred will be dealt with according to the procedures set down by the College. ASSIGNMENT TITLE The aim of this unit is to provide learners with the understanding and skills to manage their activities in the business workplace to improve their effectiveness and efficiency.   .         MBAAR   Yuvraj  Minawala     2                              Outcomes  and  assessment  requirements   Outcomes Assessment requirements To achieve each outcome a learner must demonstrate the ability to: Evidence On successful...

Words: 8149 - Pages: 33

Premium Essay

Hai, How Are U

...UNIVERSITY OF KERALA B. TECH. DEGREE COURSE 2008 ADMISSION REGULATIONS and I  VIII SEMESTERS SCHEME AND SYLLABUS of COMPUTER SCIENCE AND ENGINEERING B.Tech Comp. Sc. & Engg., University of Kerala 2 UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration...

Words: 34195 - Pages: 137

Premium Essay

Atit

...Module number: U51001 Module title: Key Business Competences Contents Module introduction 1 Semester plan synopsis 2 Module syllabus 3 Week 1 – Module Introduction 7 Week 2: Operations with numbers 8 Week 3: Understanding Data 16 Week 4 – Charts and Graphing in Excel 31 Week 5 – Summarising data 45 Week 6 Reading Week 57 Week 7 & 8 – Principles of elementary modelling 58 Week 9 & 10 – Financial Modelling (1) 69 Week 11 & 12 – Financial Modelling (2) 81 Week 13 – Modelling and Data handling in business 97 Week 14 – Revision Week 107 Week 15 – In-class Test 108 Assessment details 109 Regulations 110 A note on equal opportunities and diversity 114 Module introduction Introduction This module ensures that all students have the necessary numerical skills to proceed with the rest of their degree in Business and related fields. As a compulsory module it must be passed and a maximum of three attempts can be made to pass it, with a resit opportunity for each attempt. Past student comments on the module “Yes it is really enjoyable – I liked the course” “The lecturers are very helpful and friendly” “The handbook is really informative” “Very clear and well explained” “It is very interesting but at the same time very complex” “Maybe make the lectures and seminars more interactive” “Quickly go over the initial mathematics and spend more time on the more complex parts of the module” ...

Words: 27701 - Pages: 111

Free Essay

Embedded Systems

...COURSE/TERM PAPER Topic: Embedded Systems Name: Nyalala Innocent Odira College: 信息科学技术学院 Major: 计算机应用技术 Number: 2013114033 Teacher’s Name: 2014年1月 5日 | 南京农业大学教务处制 | Embedded system is a specialized computer system that is part of a larger system or machine. Typically, an embedded system is housed on a single microprocessor board with the programs stored in ROM. Virtually all appliances that have a digital interface like watches, microwaves, VCRs, cars etc., utilize embedded systems. Some embedded systems include an operating sys-tem, but many are so specialized that the entire logic can be implemented as a single program. The term paper would elaborate the history of embedded systems, the generations of its development, the components of embedded systems, its design issues and the programming languages that are used to build it. Then this paper would also include its current state of art, its uses, its current applications, the problems that have occurred in designing such kind of systems, also the steps taken to solve such problems and its future prospects. 1. INTRODUCTION These are the days when the term like embedded is increasingly becoming more and more popular in the world. We are flooded with embedded systems that seem to be everywhere. Now the question is what basically embedded systems are. We can...

Words: 5319 - Pages: 22

Premium Essay

Effective Learning Techniques

...Improving Students’ Learning With Effective Learning Techniques: Promising Directions From Cognitive and Educational Psychology Many students are being left behind by an educational system that some people believe is in crisis. Improving educational outcomes will require efforts on many fronts, but a central premise of this monograph is that one part of a solution involves helping students to better regulate their learning through the use of effective learning techniques. Fortunately, cognitive and educational psychologists have been developing and evaluating easy-to-use learning techniques that could help students achieve their learning goals. In this monograph, we discuss 10 learning techniques in detail and offer recommendations about their relative utility. We selected techniques that were expected to be relatively easy to use and hence could be adopted by many students. Also, some techniques (e.g., highlighting and rereading) were selected because students report relying heavily on them, which makes it especially important to examine how well they work. The techniques include elaborative interrogation, self-explanation, summarization, highlighting (or underlining), the keyword mnemonic, imagery use for text learning, rereading, practice testing, distributed practice, and interleaved practice.   To offer recommendations about the relative utility of these techniques, we evaluated whether their benefits generalize across four categories of variables: learning...

Words: 48661 - Pages: 195