Numerical Computation: Overflow, Underflow & Conditioning
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What primary challenge did researchers face when attempting to read the Herculaneum scrolls, even after utilizing X-ray technology to image the scrolls' interior?

  • The scrolls were written in multiple ancient languages, requiring diverse expertise.
  • The digital images produced by the X-rays lacked sufficient resolution for decipherment.
  • The carbon-based ink had blurred or blended with the charred papyrus over time. (correct)
  • The X-ray technology was unable to penetrate the layers of papyrus effectively.

What was the purpose behind SpaceX's Polaris Dawn mission assessing the impact of increased radiation levels on the Dragon capsule and its crew, as highlighted?

  • To prepare for future missions to the Moon and beyond by understanding radiation risks. (correct)
  • To test the effectiveness of new radiation shielding technologies developed by SpaceX.
  • assessing the Dragon capsule's ability to perform in extreme temperatures
  • To determine the effects of long-term space travel on astronauts' psychological health.

In the mission described, what critical adaptation did astronauts Isaacman and Gillis undertake due to the new SpaceX spacesuits lacking traditional life support systems?

  • They underwent a training regimen that increased their lung capacity.
  • They relied on a self-contained rebreathing apparatus for oxygen.
  • They were tethered to the spacecraft with a cord providing oxygen. (correct)
  • They utilized a portable oxygen generator within the Dragon spacecraft.

What was the key innovation introduced by Brent Seales in 2009 to study the Herculaneum scrolls without causing physical damage?

<p>Employing X-ray technology to image the scrolls' interior. (D)</p> Signup and view all the answers

The decoded passages from the Herculaneum scrolls are attributed to which philosopher, known for contemplating the impact of material wealth on human happiness?

<p>Philodemus (C)</p> Signup and view all the answers

What specific accomplishment related to altitude did the SpaceX Polaris Dawn mission achieve on September 11, 2024?

<p>Achieved a higher point above Earth than any prior human spaceflight since the Apollo missions. (A)</p> Signup and view all the answers

In March 2023, as part of the "Vesuvius Challenge," what resources did Seales and his team provide to external participants to aid in decoding the ancient scrolls?

<p>An AI program along with thousands of 3D X-ray images of the rolled-up scrolls and papyrus fragments (A)</p> Signup and view all the answers

What is the significance of identifying the Greek word "porphyras" from the scrolls in relation to the broader historical and cultural research?

<p>Offers insight into language and potential philosophical concepts during that era. (C)</p> Signup and view all the answers

On what date did SpaceX’s Dragon capsule lift off from Florida’s Kennedy Space Center for the Polaris Dawn mission?

<p>September 10, 2024 (D)</p> Signup and view all the answers

In what year did researchers discover over 1,800 rolled papyrus scrolls inside the library of a Herculaneum mansion, marking a significant event in the study of ancient texts?

<p>1752 (C)</p> Signup and view all the answers

What specific medical research is being conducted on the crew of the Dragon capsule after their return to Earth on September 15, 2024, following their historic mission?

<p>Assessing the effects of space travel on their bodies to develop strategies to protect astronauts on future lunar and deep-space missions. (D)</p> Signup and view all the answers

Approximately what percentage of the Herculaneum scroll had the decoding teams managed to cover, according to the details provided?

<p>5% (B)</p> Signup and view all the answers

What is the primary goal of continuing to challenge contestants to decode the Herculaneum scrolls, as announced by Seales, with a $100,000 cash prize offered?

<p>to encourage broader participation and speed up process of deciphering all scrolls (B)</p> Signup and view all the answers

Beyond exceeding altitude records, what broader scientific importance was attributed to achieving a significant height during the Dragon capsule flight?

<p>Assessing the impact of increased radiation levels on the capsule and its crew. (D)</p> Signup and view all the answers

In 79 AD, which volcano erupted and subsequently buried the ancient cities of Pompeii and Herculaneum under a considerable layer of volcanic debris?

<p>Mount Vesuvius (D)</p> Signup and view all the answers

How did mechanically unrolling the scrolls contribute to their degradation, complicating efforts to study them?

<p>The scrolls crumbled into dust due to the delicate nature of the material. (B)</p> Signup and view all the answers

What prompted researchers to explore alternatives such as X-ray technology, moving away from the prior method of mechanically unrolling the ancient scrolls?

<p>Mechanical unrolling damaged scrolls, leading to dust. (B)</p> Signup and view all the answers

What was the first word identified from one of the Herculaneum scrolls, and in what language was it written?

<p>&quot;Porphyras&quot; in Greek (D)</p> Signup and view all the answers

What specific type of routine did astronauts Isaacman and Gillis undergo to mitigate the risks of decompression sickness prior to their spacewalk?

<p>Pre-Breathing (C)</p> Signup and view all the answers

How is the use of AI and machine learning primarily benefiting the effort to decipher the Herculaneum scrolls, according to Seales's insights?

<p>Creating virtual unwrapping and ink detection to achieve breakthroughs. (C)</p> Signup and view all the answers

Which team earned the top prize of $700,000 initially by decoding 85 percent of the characters in four passages from the Herculaneum scrolls, with each passage containing 140 characters?

<p>A team including Youssef Nader and Julian Schillinger (C)</p> Signup and view all the answers

Besides decoding 85 percent of the characters in four passages, what additional feat did the winning team accomplish to further contribute to the understanding of the damaged Herculaneum scrolls?

<p>Reading an additional 15 partial columns of text beyond initial requirements (B)</p> Signup and view all the answers

According to Seales, the material found in the Herculaneum scrolls dating back 2,000 years reveals that ancient people wrote about?

<p>War, love, and philosophical views of the world. (A)</p> Signup and view all the answers

What specific insights are researchers hoping to gain from the scrolls found to be preserved in Herculaneum?

<p>Insights about life in ancient times. (C)</p> Signup and view all the answers

What is the deadline set by Seales to decode an entire scroll?

<p>End of 2024 (B)</p> Signup and view all the answers

What was the cruising altitude of the SpaceX Dragon capsule, where the first-ever civilian spacewalk took place?

<p>435 miles (700 km) (C)</p> Signup and view all the answers

What is the name of the competition launched by Brent Seales and his team to accelerate the process of deciphering texts from damaged Herculaneum scrolls, incentivizing contribution through cash prizes?

<p>The Vesuvius Challenge (C)</p> Signup and view all the answers

Who is funding the Polaris missions, which include civilian spaceflights and research on the effects of space travel?

<p>Jared Isaacman (C)</p> Signup and view all the answers

What original purpose were the new SpaceX spacesuits created for?

<p>To prevent decompression sickness (D)</p> Signup and view all the answers

What was the previous record for the highest point above Earth achieved by a manned mission before the Polaris Dawn mission?

<p>NASA's Apollo 11 Mission (C)</p> Signup and view all the answers

Which three individuals directly contributed to the first successful decode of the Herculaneum scrolls?

<p>Youssef Nader, Luke Farritor, Julian Schillinger (C)</p> Signup and view all the answers

Before deploying X-ray technology, why was it hard to analyze the carbonized papyrus of the Herculaneum scrolls?

<p>The carbon-based ink blended with charred papyrus. (C)</p> Signup and view all the answers

What is the name of the first-ever civilian spacewalk?

<p>Polaris Dawn (D)</p> Signup and view all the answers

According to the texts, what does humanity have a deep connection to in terms of philosophy?

<p>Ancient cultures (D)</p> Signup and view all the answers

Before the use of AI to decode the scrolls, the decoding team initially had to decode how many characters, within how many passages, to win the $700,000 prize?

<p>85 characters in 4 passages (A)</p> Signup and view all the answers

How many scrolls were identified on the Herculaneum mansion?

<p>1,800 (D)</p> Signup and view all the answers

Where does the Dragon capsule lift off prior to the Polaris Dawn mission?

<p>Florida (A)</p> Signup and view all the answers

When was the historic Dragon mission ended?

<p>September 15, 2024 (B)</p> Signup and view all the answers

Who was with Jared Isaacman during the Polaris mission?

<p>Scott Poteet (C)</p> Signup and view all the answers

Flashcards

Porphyras

Greek word for purple identified in ancient scroll.

Philodemus

Philosopher to whom the decoded passage was attributed.

Seales' Goal

Challenging contestants to decode an entire scroll by the end of 2024.

Herculaneum scrolls

A competition to amplify and accelerate the breakthroughs by refining the ink detection.

Signup and view all the flashcards

Pompeii and Herculaneum

Italian city buried by Mount Vesuvius eruption in 79 AD.

Signup and view all the flashcards

Brent Seales

Used X-ray technology to image the scrolls' Interior without opening them.

Signup and view all the flashcards

new SpaceX spacesuits and pre-breathing

prevent decompression sickness in space

Signup and view all the flashcards

Important Reason for Polaris Dawn Altitude

To assess the impact of increased radiation on astronauts.

Signup and view all the flashcards

SpaceX new Milestone

September 15, 2024.

Signup and view all the flashcards

The Spacecraft Reached

870 Miles

Signup and view all the flashcards

Study Notes

Chapter 4: Numerical Computation

4.1 Overflow and Underflow

  • Underflow happens when numbers near zero are rounded to zero, causing potential problems like division by zero or taking the logarithm of zero.
  • Overflow arises when numbers with large magnitudes are approximated as infinity, leading to non-numerical results in further calculations.
  • Softmax function is provided: $\operatorname{softmax}(x){i}=\frac{\exp \left(x{i}\right)}{\sum_{j=1}^{n} \exp \left(x_{j}\right)}$.
  • With softmax, if $x_i$ is very negative, $\exp(x_i)$ underflows to zero; if $x_i$ is very large, $\exp(x_i)$ overflows.
  • Normalizing the input to the softmax function, where $z = x - \max_i x_i$, combats overflow and underflow.
  • The normalized softmax function is equivalent to the original function and stabilizes computation.

4.2 Poor Conditioning

  • Condition number signifies how much a function's output changes with small input changes, defined by $\frac{|\delta f|}{|f|} \leq \text { condition number } \frac{|\delta x|}{|x|}$.
  • A large condition number indicating high sensitivity to input errors.

4.3 Gradient-Based Optimization

  • Most deep learning algorithms aim at minimizing an objective function $J(\theta)$ with parameters $\theta$.
  • Gradient descent updates parameters $\theta$ in the opposite direction of the gradient: $\theta \leftarrow \theta-\epsilon \nabla_{\theta} J(\theta)$, where $\epsilon$ is the learning rate.
  • Jacobian matrix contains all the partial derivatives of a function with multiple inputs and outputs, defined by $\boldsymbol{J}{i, j}=\frac{\partial f(\boldsymbol{x}){i}}{\partial x_{j}}$.
  • Hessian matrix contains all second derivatives of a function, defined by $\boldsymbol{H}(f)(\boldsymbol{x}){i, j}=\frac{\partial^{2} f(\boldsymbol{x})}{\partial x{i} \partial x_{j}}$.
  • Negative gradient indicates steepest descent and positive gradient indicates steepest ascent.

4.4 Constrained Optimization

  • Optimization with constraints means minimizing or maximizing a function under specific conditions, such as $\underset{\boldsymbol{x}}{\operatorname{minimize}} f(\boldsymbol{x})$ subject to $g(\boldsymbol{x})=0$.
  • Karush-Kuhn-Tucker (KKT) approach solves these problems using Lagrangian function: $L(\boldsymbol{x}, \lambda)=f(\boldsymbol{x})+\lambda g(\boldsymbol{x})$.
  • $\lambda$ are the KKT multipliers in KKT approach.

4.5 Example: Linear Least Squares

  • Seeks to minimize squared error in a system of equations $\mathbf{A}\mathbf{x} = \mathbf{b}$.
  • Objective function is $J(\boldsymbol{x})=\frac{1}{2}|\boldsymbol{A} \boldsymbol{x}-\boldsymbol{b}|_{2}^{2}$.
  • Gradient is $\nabla_{\boldsymbol{x}} J(\boldsymbol{x})=\boldsymbol{A}^{\top}(\boldsymbol{A} \boldsymbol{x}-\boldsymbol{b})$.
  • Normal equations are given by $\boldsymbol{A}^{\top} \boldsymbol{A} \boldsymbol{x}=\boldsymbol{A}^{\top} \boldsymbol{b}$.
  • Solution: $\boldsymbol{x}=\left(\boldsymbol{A}^{\top} \boldsymbol{A}\right)^{-1} \boldsymbol{A}^{\top} \boldsymbol{b}$.
  • $\boldsymbol{A}^{\top} \boldsymbol{A}$ may not always be invertible.

Lecture 26: Complexity Classes P and NP

The Complexity Class P

  • P is the set of languages decidable in polynomial time on a deterministic single-tape Turing machine, represented as $P = \bigcup_{k} TIME(n^k)$.

  • Polynomial time is robust against changes in the computation model and is "nice".

  • "Nice" means, $n^{100}$ is polynomial and not polynomial like $2^{\log^2 n}$ (quasi-polynomial)

  • Examples of Problems in P:

    • PATH: Determining if a directed graph has a directed path from s to t.
    • Connected: Determining if an undirected graph is connected.
    • SORT: Ordering a list of orderable items.
    • PRIMES: Determining if an integer represents a prime number.
    • MAXIMUM MATCHING: Determining if a bipartite graph has a matching of size at least k.

The Complexity Class NP

  • NP is defined using verifiers, where intuition suggests that while finding a solution may be hard, recognizing one is easy.
  • A verifier $V$ for a language $A$ defined as $A = {w | V \text{ accepts } \text{ for some string } c }$.
  • The maximum length of certificate $c$ is polynomial in the length of $w$.
  • A polynomial time verifier runs in polynomial time in the length of $w$.
  • NP is the class of languages with polynomial time verifiers.
  • NP is "nondeterministic polynomial time" because a nondeterministic Turing machine can guess and verify the certificate c.
  • P vs NP question questions whether polynomial time verifiability implies polynomial time solvability.

Algorithmes de Hachage (Hashing Algorithms)

Définition (Definition)

  • Hashing algorithms are functions that transform arbitrary-sized input into a fixed-size output, also known as a hash or fingerprint.

Objectifs (Goals/Objectives)

  • Condenser l'information: Transform long documents into a short fingerprint.
  • Vérifier l'intégrité des données: Detect unintentional data modification.
  • Signatures numériques: More efficient to sign a hash (instead of signing the document entirely).
  • Stockage de mots de passe: Store password hashes instead of passwords.

Propriétés Essentielles (Essential Properties)

  • Efficacité: Hashing needs to be quick.
  • Résistance à la préimage: Given a hash, it should be hard to find any input that hashes to that value.
  • Résistance à la seconde préimage: Given an input, it should be hard to find a different input that hashes to the same value.
  • Résistance aux collisions: It should be hard to find two different inputs that hash to the same value (a "collision").

Attaques (Attacks)

  • Attaque par force brute: Trying all possible inputs until you get a target hash.
  • Attaque d'anniversaire: Exploit the birthday paradox to find collisions more quickly.
  • Attaques cryptanalytiques: Exploit specific weaknesses to the algorithm.

Exemples d'Algorithmes (Examples)

MD5 (Message Digest Algorithm 5)

  • Taille du haché (Hash Size): 128 bits.
  • Vulnérabilités (Vulnerabilities): Seriously vulnerable to collision attacks.
  • Utilisation (Usage): Obsolete, should not be used when security is needed.

SHA-1 (Secure Hash Algorithm 1)

  • Taille du haché (Hash Size): 160 bits.
  • Vulnérabilités (Vulnerabilities): Vulnerable to collision attacks.
  • Utilisation (Usage): Deprecated, should not be used for new development.

SHA-2 (Secure Hash Algorithm 2)

  • Famille (Family): SHA-224, SHA-256, SHA-384, SHA-512.
  • Tailles de haché (Hash Sizes): 224, 256, 384, 512 bits.
  • Sécurité (Security): Considered generally secure, but SHA-3 is preferred for new applications.
  • Utilisation (Usage): Heavily used for various application security.

SHA-3 (Secure Hash Algorithm 3)

  • Basé sur (Based on): Keccak Algorithm.
  • Tailles de haché (Hash Sizes): 224, 256, 384, 512 bits.
  • Sécurité (Security): Designed to be an alternative if SHA-2 is attacked.
  • Utilisation (Usage): Gaining popularity.

Conclusion (Conclusion)

  • The hash algorithm depends on security.
  • Stay informed about new findings from security experts.

Lecture 19: Transient Response

First Order Circuits

  • This discusses the transient response of circuits.

Definition of Time Constant

  • For an RC or RL circuit, the time constant $\tau$ is the time it will take for the response to decay to $e^{-1}$ or 36.8% of its first value.
  • For RC Circuit: $$\tau = RC$$
  • For RL Circuit:$$\tau = \frac{L}{R}$$

Procedure to Determine Transient Response

  1. Determine the final initial condition
    • $x(0)$
  2. Determine the final value
    • $x(\infty)$
  3. Time constant
    • $\tau$
  • Then use:
    • $$x(t) = x(\infty) + [x(0) - x(\infty)]e^{-t/\tau}, \quad t \geq 0$$
    • Where $x(t)$ can be $v(t)$ or $i(t)$.

Example 1

  • Switch is opened at $t = 0$ and, $v(t)$ must be found for $t > 0$.
  • the capacitor is charged to 15v.
  • Initial Condition: $v(0) = 15V$.
  • Final Value: $v(\infty) = 0V$.
  • Time Constant: $\tau = RC = (50k\Omega)(2\mu F) = 0.1s$.
  • $$v(t) = 0 + (15 - 0)e^{-t/0.1} = 15e^{-10t}V, \quad t > 0$$

Example 2

  • Close Switch at $t=0$ to find $i_L(t)$ for $t > 0$.
  • The current cannot change instantaneously.
  • Initial Condition:* $i_L(0) = 0A$.
  • Final Value:* $i_L(\infty) = \frac{20V}{(4+6)\Omega} = 2A$.
  • Time Constant:* $\tau = \frac{L}{R} = \frac{0.5H}{10\Omega} = 0.05s$.
  • Therefore: $$i_L(t) = 2 + (0 - 2)e^{-t/0.05} = 2 - 2e^{-20t}A, \quad t > 0$$

Summary

  • The transient response can be found by finding the initial condition, final value, and time constant, then using the general equation $$x(t) = x(\infty) + [x(0) - x(\infty)]e^{-t/\tau}$$.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This content discusses overflow and underflow issues in numerical computation, particularly in the context of the softmax function. It explains how these issues can arise and provides a normalization technique to stabilize computation. Additionally, it touches on poor conditioning and its impact on function outputs.

More Like This

Use Quizgecko on...
Browser
Browser