Explore chapters and articles related to this topic
QCA based binary adder-subtractor
Published in Arun Kumar Sinha, John Pradeep Darsy, Computer-Aided Developments: Electronics and Communication, 2019
Akondi Narayana Kiran, Padavala Akhendra Kumar
One way to detect the overflow is considering the sign of two ‘n’-bit numbers and comparing it to that of the result of their addition. i.e., an–1, bn–1 and Cn. If the two ‘n’-bit numbers are of positive i.e., an-1 = 0 and bn–1 = ‘0’ and the sign of the result is negative i.e., Cn = ‘1’ then it shows that the addition of the two positive numbers is resulted in a negative value, it indicates an overflow has occurred.Similarly in case of adding two negative numbers, if the addition results in a non-negative result, it shows that an overflow has occurred.
Fundamentals
Published in A. C. Faul, A Concise Introduction to Numerical Analysis, 2018
Overflow is caused by any operation whose result is too large in absolute value to be represented. This can be the result of exponentiation or multiplication or division or, just possibly, addition or subtraction. It is better to highlight the occurrence of overflow with the quantity ∞ than returning the largest representable number. As an example, consider computing x2+y2, when β = 10, p = 3, and emax = 100. If x = 3.00 × 1060 and y = 4.00 × 1060, then x2, y2, and x2 + y2 will each overflow in turn, and be replaced by 9.99 × 10100. So the final result will be 9.99×10100 = 3.16 × 1050, which is drastically wrong: the correct answer is 5 × 1060. In IEEE arithmetic, the result of x2 is ∞ and so is y2, x2 + y2 and x2+y2. Thus the final result is ∞, indicating that the problems should be dealt with programmatically. A well-written routine will remove possibilities for overflow occurring in the first place.
War of Control Hijacking
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
Ragini Karwayun, Monika Sainger
The integer overflow occurs when an arithmetic operation tries to generate a numeric value that is larger than the storage space allocated to store that value. It has been a very common problem for a very long time, but now integer overflow vulnerabilities are used by hackers. There is a race between the number of integer overflow vulnerabilities exploited and the detection methods used for integer overflows, both growing at a very rapid pace.
In favour of or against multi-lingual Q&A sites? Exploring the evidence from user and knowledge perspectives
Published in Behaviour & Information Technology, 2021
Junfang Jia, Valeriia Tumanian, Guoqiang Li
Recently, machine translation has made big progress by incorporating deep learning methods (Sutskever, Vinyals, and Le 2014; Wu et al. 2016). To assist high-quality translation, we can adopt the power of advanced machine translation to first obtain an overall translation, and then let human users revise the translation. However, the general machine translation system may not work well for Q&A discussions, and it needs to be improved in two aspects. First, current machine translation models focus on sentence-level translation without contextual information. However, to translate an answer well in a Q&A discussion thread, the model not only needs to consider the current sentence in the answer, but also needs to take the corresponding question information into consideration. Second, Stack Overflow is a domain-specific site about computer programming, while the current machine translation system is trained for general purpose. Many domain-specific words will be out of vocabulary or have different meanings from daily life such as ‘bug’, ‘port’, etc. So the general machine translation model must be customised by incorporating the domain-specific knowledge.
Combined Vorticity Confinement and TVD Approaches for Accurate Vortex Modelling
Published in International Journal of Computational Fluid Dynamics, 2020
Alex Povitsky, Kristopher C. Pierson
Figure 3(c) is the results of the case with . Here, the second-order scheme failed and produced an arithmetic overflow values due to over-confinement. The results of the van Albada differentiable limiter by Equation (10) also showed signs of over-confinement (compare Figure 3(c) with Figure 3(b)). The minmod limiter (Equation (9)) was less affected by the selection of the value of c, and the results were similar to those of the simulation using . This indicates that the non-differentiable minmod limiter is more robust with respect to a selected value of compared to the differentiable van Albada limiter. Thus, a larger range ofc values would produce suitable confinement of the vortex when using the minmod limiter.
Accurate Computation of Vocal Tract Filter Parameters Using a Hybrid Genetic Algorithm
Published in Applied Artificial Intelligence, 2019
Mathew Mithra Noel, Venkataraman Muthiah-Nakarajan, Ruban Nersisson
In particular, if the pole values are close to unity the system can have limit cycles, adversely affecting the settling time. These problems are alleviated to some extent by doing saturation arithmetic in which the added value reaches a maximum or minimum and does not overflow or underflow as the case may be (Proakis and Manolakis 2003). Saturation arithmetic, however, makes the system non-linear because of the clipping. The remedy for this problem is to scale the signal or system parameters so that the chances of entry into the non-linear region is avoided (Proakis and Manolakis 2003). Since downscaling signal size will be detrimental to the SNR (signal-to-noise ratio), the usual practice is to minimize the size of the poles. In this work, the penalty forces the poles to be bounded above by a magnitude of 0.9. Thus, the problems of finite precision are dealt with automatically.