Computer Systems Assignment: Binary, Systems, and Networking Concepts
VerifiedAdded on 2022/08/25
|18
|2741
|23
Homework Assignment
AI Summary
This document provides a detailed solution to a computer systems assignment. The assignment covers a range of topics including computer hardware specifications, software components and their roles, the comparison of mainframe and laptop computers, system architecture concepts, and binary number systems. The solution includes conversions between decimal, binary, octal, and hexadecimal number systems, binary arithmetic, and ASCII representation. Furthermore, the document explores topics such as data compression (lossy and lossless), computer architecture, interrupts, DMA, networking concepts, and network protocols. It also touches upon concurrent processing, operating systems, and file systems. The assignment delves into both theoretical concepts and practical applications within computer systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head:
Computer Systems
Name of the Student
Name of the University
Author Note
Computer Systems
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
Task 1:
For buying a personal computer the basic and important features are given below. At first
Random Access Memory (RAM) is the main memory of a computer. It improves the speed of
the computer. It should be of 8Gigabyte for better performance. The hard disk drive should be of
minimum 1Terabyte (TB). If it is of 2Tb, it would be great but having 1Tb storage is okay.
Processor is the main function that controls the computer. It would be great if the processor is i5
with 8th generation. i5 is far better than i3 and this provides much speed than the 7th generation.
Task 2:
The components of a software system are Network services, hardware level operating system,
logical level of operating system, Graphics engine and so on.
Role of network services is it provides a data storage, manipulation and so other things on the
internet.
Role of hardware level operating system is that hides the complexities of the processor. This
includes managing hardware resources like memory, data storage and so on.
Role of logical level operating system is that it provides higher functions like, internet access,
file management.
Role of Graphics engine permits the software framework to build games. They provides features
from animation to artificial intelligence.
Task 3:
The statement implies that each of them has the same facility or speed. But the main difference is
they are built or developed in a same manner but their appearance, flexibility.
Task 1:
For buying a personal computer the basic and important features are given below. At first
Random Access Memory (RAM) is the main memory of a computer. It improves the speed of
the computer. It should be of 8Gigabyte for better performance. The hard disk drive should be of
minimum 1Terabyte (TB). If it is of 2Tb, it would be great but having 1Tb storage is okay.
Processor is the main function that controls the computer. It would be great if the processor is i5
with 8th generation. i5 is far better than i3 and this provides much speed than the 7th generation.
Task 2:
The components of a software system are Network services, hardware level operating system,
logical level of operating system, Graphics engine and so on.
Role of network services is it provides a data storage, manipulation and so other things on the
internet.
Role of hardware level operating system is that hides the complexities of the processor. This
includes managing hardware resources like memory, data storage and so on.
Role of logical level operating system is that it provides higher functions like, internet access,
file management.
Role of Graphics engine permits the software framework to build games. They provides features
from animation to artificial intelligence.
Task 3:
The statement implies that each of them has the same facility or speed. But the main difference is
they are built or developed in a same manner but their appearance, flexibility.

2
Task 4:
A conceptual model that states the behavior, structure of an architecture is known as system
architecture. As well as it is defines how a process will be executed.
Task 5:
Task 6:
(5278)10= 5*103+2*102+7*101+8*100
Task 7:
The range will be 0-17.
Task 8:
The binary addition is 10101 + 1110= 100011
The binary multiplication is 10101 * 1110= 100100110
Task 9:
For converting decimal to hexadecimal it will be the best way to convert the decimal into binary
and then converting the binary to hexadecimal.
(12345)10 = (11000000111001)2 = (3039)16
From the above solution the binary of 12345 is also provided.
(12345)10 = (11000000111001)2
Task 10:
(212)10 = (324)8
Task 4:
A conceptual model that states the behavior, structure of an architecture is known as system
architecture. As well as it is defines how a process will be executed.
Task 5:
Task 6:
(5278)10= 5*103+2*102+7*101+8*100
Task 7:
The range will be 0-17.
Task 8:
The binary addition is 10101 + 1110= 100011
The binary multiplication is 10101 * 1110= 100100110
Task 9:
For converting decimal to hexadecimal it will be the best way to convert the decimal into binary
and then converting the binary to hexadecimal.
(12345)10 = (11000000111001)2 = (3039)16
From the above solution the binary of 12345 is also provided.
(12345)10 = (11000000111001)2
Task 10:
(212)10 = (324)8

3
Task 11:
(117)10= (75)16
Task 12:
(12345)10 = (11000000111001)2
Task 13:
(27.625)10= (11011)2
(4192.37761)10= (1000001100000)2
Task 14:
(0.1001001)10= 0
(1100101.1)10= (101)2
Task 15:
Motion vector captures the differences between video frames. After that DCT (Discrete Consine
Transform) is used to convert information. After that quantization is put on for DCT coefficients.
Then Huffman encoding uses small codes to demonstrate common values.
Task 16:
1010100= 84, 1101000=104, 1101001=105, 1110011=115, 0100000=32
1101001=105, 1110011= 115, 0100000=32, 1000101=69, 1000001=65,
1010011=83, 1011001=89, 0100001=33
Task 11:
(117)10= (75)16
Task 12:
(12345)10 = (11000000111001)2
Task 13:
(27.625)10= (11011)2
(4192.37761)10= (1000001100000)2
Task 14:
(0.1001001)10= 0
(1100101.1)10= (101)2
Task 15:
Motion vector captures the differences between video frames. After that DCT (Discrete Consine
Transform) is used to convert information. After that quantization is put on for DCT coefficients.
Then Huffman encoding uses small codes to demonstrate common values.
Task 16:
1010100= 84, 1101000=104, 1101001=105, 1110011=115, 0100000=32
1101001=105, 1110011= 115, 0100000=32, 1000101=69, 1000001=65,
1010011=83, 1011001=89, 0100001=33
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
Now we have the ASCII values of each binary value. If the character values of them are
calculated, we can get the string. The string is “This is EASY!”
Task 17:
A number cannot be negative. So there would be no decimal, octal, hexadecimals and ASCII.
Task 18:
Lossy compression Lossless compression
Lossy compression is used in audios, videos
and images.
Lossless compression is used in text or
programme.
Lossy compression is part of data encoding
method.
Lossless compression is part of data
compression algorithm.
Lossy compression’s applications are JPEG,
MP3, and MP4.
Lossless compression’s applications are PNG,
BMP and FLAC.
Lossy compression’s data-holding capacity is
better than lossless.
It has less data-holding capacity.
Lossy compression provides smaller file.
Lost in lossy audio data compression happens when the range of audio decreased and the quality
of audio has reduced.
Lossy data compression is used to reduce the bit size of an image or picture. For that reason the
original file can be restructured. When there should no data loss, in such cases lossy data
compression cannot be used.
Now we have the ASCII values of each binary value. If the character values of them are
calculated, we can get the string. The string is “This is EASY!”
Task 17:
A number cannot be negative. So there would be no decimal, octal, hexadecimals and ASCII.
Task 18:
Lossy compression Lossless compression
Lossy compression is used in audios, videos
and images.
Lossless compression is used in text or
programme.
Lossy compression is part of data encoding
method.
Lossless compression is part of data
compression algorithm.
Lossy compression’s applications are JPEG,
MP3, and MP4.
Lossless compression’s applications are PNG,
BMP and FLAC.
Lossy compression’s data-holding capacity is
better than lossless.
It has less data-holding capacity.
Lossy compression provides smaller file.
Lost in lossy audio data compression happens when the range of audio decreased and the quality
of audio has reduced.
Lossy data compression is used to reduce the bit size of an image or picture. For that reason the
original file can be restructured. When there should no data loss, in such cases lossy data
compression cannot be used.

5
Extra Tasks:
Task 19:
(38)10 = (100110)2
(24)10= (11000)2
After calculating the 1’s complement the values will be 11001, 111
Addition is 100000
Task 20:
(1987)10 = (11111000011)2
For 1’s complement all 1 of binary number will be converted into 0 and 0 will be converted into
1. After 1’s complement the number will be (00000111100). After having the 1’s complement if
1 is added with the binary number, 2’s complement will be calculated. Therefore the 2’s
complement of the number is (00000111101)2.
Task 21:
10’s complement of 24379 is 75621 and
10’s complement of 5098 is 4902.
Addition is (75621+4902) = 80523.
Task 22:
(171.625)= (01010111010000000000000)24
The value should be 24 bit. Therefore rest of the bytes are represented in 0.
Extra Tasks:
Task 19:
(38)10 = (100110)2
(24)10= (11000)2
After calculating the 1’s complement the values will be 11001, 111
Addition is 100000
Task 20:
(1987)10 = (11111000011)2
For 1’s complement all 1 of binary number will be converted into 0 and 0 will be converted into
1. After 1’s complement the number will be (00000111100). After having the 1’s complement if
1 is added with the binary number, 2’s complement will be calculated. Therefore the 2’s
complement of the number is (00000111101)2.
Task 21:
10’s complement of 24379 is 75621 and
10’s complement of 5098 is 4902.
Addition is (75621+4902) = 80523.
Task 22:
(171.625)= (01010111010000000000000)24
The value should be 24 bit. Therefore rest of the bytes are represented in 0.

6
Task 23:
In Little man’s computer, it first goes to the calculator and then checks the number. After that the
number is put into mailbox. But the number in calculation do not have any changes . At last the
specified number replaced with the new one in the calculator.
Task 24:
INP
STA A
INP
STA B
LDA A
SUB B
OUT
HLT
A DAT
B DAT
Task 25:
Task 26:
INP
STA M0
INP
Task 23:
In Little man’s computer, it first goes to the calculator and then checks the number. After that the
number is put into mailbox. But the number in calculation do not have any changes . At last the
specified number replaced with the new one in the calculator.
Task 24:
INP
STA A
INP
STA B
LDA A
SUB B
OUT
HLT
A DAT
B DAT
Task 25:
Task 26:
INP
STA M0
INP
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
STA M1
INP
STA M2
SUB M1
BRP J1
LDA M1
STA M2
J1 LDA M2
SUB M0
BRP J2
LDA M0
STA M2
LDA M0
STA M2
JA LDA M2
OUT
HLT
M0 DAT
STA M1
INP
STA M2
SUB M1
BRP J1
LDA M1
STA M2
J1 LDA M2
SUB M0
BRP J2
LDA M0
STA M2
LDA M0
STA M2
JA LDA M2
OUT
HLT
M0 DAT

8
M1 DAT
M2 DAT
Task 27:
IN
STO 99
IN
ADD 99
STO 99
IN
SUN 99
OUT
COB
Task 29:
INP
STA A
INP
STA B
LDA A
SUB B
OUT
M1 DAT
M2 DAT
Task 27:
IN
STO 99
IN
ADD 99
STO 99
IN
SUN 99
OUT
COB
Task 29:
INP
STA A
INP
STA B
LDA A
SUB B
OUT

9
HLT
A DAT
B DAT
Task 30:
IN
STO 99
IN
ADD 99
STO 99
IN
SUB 99
OUT
COB
Task 31:
Interrupt is such a signal that is sent from a particular programme that wants the central
processing unit to be stopped and after that decide what to do next. Interrupts are generally used
for service hardware timers, data transfer, handle mouse and keyboard events.
Most of the microprocessors have multiple hardware timers. This timers also support for
interrupts.
HLT
A DAT
B DAT
Task 30:
IN
STO 99
IN
ADD 99
STO 99
IN
SUB 99
OUT
COB
Task 31:
Interrupt is such a signal that is sent from a particular programme that wants the central
processing unit to be stopped and after that decide what to do next. Interrupts are generally used
for service hardware timers, data transfer, handle mouse and keyboard events.
Most of the microprocessors have multiple hardware timers. This timers also support for
interrupts.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
Sometime in order to transfer data interrupts are used.
Whenever any interrupt is received from keyboard and mouse, they are handled. Interrupt is such
used for creating or managing such interrupts.
Task 32:
The disk system is interrupting the programme code.
Interrupt is basically used to signify and signal that data blocks are either ready or written and is
used to indicate about the completion of the operation. In absence of interrupt, processor has to
add disk transfer of hardware systems.
After an interrupt, stack store the processor state, and after that the stack pointer is updated to
add the saved data. Instruction pointer changed its location so that it can point the interrupt
handler’s location.
Task 33:
Error handling event is such an example in which interrupt is first occurred.
Status event is such an example in which interrupt is occurred at the completion of an event.
In polling interrupt CPU all time checks the device status. It checks whether the device needs the
CPU attention or not. Polled interrupt sends a message to a part of the computer that has the I/O
interface.
In polling interrupt command-ready bit is such a bit that indicates that the processor needs
attention. In polled interrupt a message is sent about the status of the device to repair.
Sometime in order to transfer data interrupts are used.
Whenever any interrupt is received from keyboard and mouse, they are handled. Interrupt is such
used for creating or managing such interrupts.
Task 32:
The disk system is interrupting the programme code.
Interrupt is basically used to signify and signal that data blocks are either ready or written and is
used to indicate about the completion of the operation. In absence of interrupt, processor has to
add disk transfer of hardware systems.
After an interrupt, stack store the processor state, and after that the stack pointer is updated to
add the saved data. Instruction pointer changed its location so that it can point the interrupt
handler’s location.
Task 33:
Error handling event is such an example in which interrupt is first occurred.
Status event is such an example in which interrupt is occurred at the completion of an event.
In polling interrupt CPU all time checks the device status. It checks whether the device needs the
CPU attention or not. Polled interrupt sends a message to a part of the computer that has the I/O
interface.
In polling interrupt command-ready bit is such a bit that indicates that the processor needs
attention. In polled interrupt a message is sent about the status of the device to repair.

11
Task 34:
DMA stands for Direct Memory Access. DMA is such a technique that permits any input output
device to directly access the main memory of a computer.
Capabilities added by DMA-
DMA increase the speed of a computer, without getting help of processor.
It decrease the workload of processor.
DMA required less clock cycles for completing a process.
Extra task:
For the very first time when an interrupt is occurred, CPU gives it the higher priority and looks
upon it. While checking or processing the interrupting if another interrupt is occurred then the
second one will remain pending. After successful completion of the first interrupt CPU checks
whether any more interrupt is pending or not. If any pending interrupt is present then CPU will
execute that interrupt. In this manner, CPU manages many interrupts in a sequential matter.
Purpose of a completion interrupt-
DMA controllers uses interrupts to let the CPU know about the successful data transfer.
Therefore it is important to complete the interrupt after DMA transfer.
Task 35:
In our daily life internet is very important and transferring data from one to another is such an
example. In the social networking sites data communication is must and has great importance.
Task 34:
DMA stands for Direct Memory Access. DMA is such a technique that permits any input output
device to directly access the main memory of a computer.
Capabilities added by DMA-
DMA increase the speed of a computer, without getting help of processor.
It decrease the workload of processor.
DMA required less clock cycles for completing a process.
Extra task:
For the very first time when an interrupt is occurred, CPU gives it the higher priority and looks
upon it. While checking or processing the interrupting if another interrupt is occurred then the
second one will remain pending. After successful completion of the first interrupt CPU checks
whether any more interrupt is pending or not. If any pending interrupt is present then CPU will
execute that interrupt. In this manner, CPU manages many interrupts in a sequential matter.
Purpose of a completion interrupt-
DMA controllers uses interrupts to let the CPU know about the successful data transfer.
Therefore it is important to complete the interrupt after DMA transfer.
Task 35:
In our daily life internet is very important and transferring data from one to another is such an
example. In the social networking sites data communication is must and has great importance.

12
Task 36:
Data are sent into many packets because it would decrease the size of the whole data. Each
packet has some receiver id, which helps him to get to the receiver. For some reason if one
packet is hacked by the intruder, the others can reach to its destination. Packets choose the best
route for data transfer. Each of the packets or none of them choose the path, this makes the
network more efficient.
Task 37:
If the number of nodes is 50 then the number of connections will be 50*(50-1)/2. So the required
number will be 1225.
Task 36:
Data are sent into many packets because it would decrease the size of the whole data. Each
packet has some receiver id, which helps him to get to the receiver. For some reason if one
packet is hacked by the intruder, the others can reach to its destination. Packets choose the best
route for data transfer. Each of the packets or none of them choose the path, this makes the
network more efficient.
Task 37:
If the number of nodes is 50 then the number of connections will be 50*(50-1)/2. So the required
number will be 1225.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
Extra tasks:
Differences between logical and physical tropology-
Logical tropology implies a higher view than the physical one.
Logical tropology shows how the devices are connected to the user where the physical tropology
shows how they are physically connected with wires or cables.
Differences between Connectionless and Connection-oriented communication-
In Connectionless communication, establishment of connection is needless while in Connection-
oriented communication establishment of connection is mandatory.
Connection-oriented communication is better and more reliable while Connectionless
communication is less reliable.
Task 38:
Some of the application layer’s protocols are-
Simple mail transfer protocol (SMTP), Network file system (NFS), File transfer protocol (FTP),
FTP is such a method that actually lets the users to transfer file. Using FTP two computers can
be connected with each other and can transfer files.
SMTP moves user’s emails across the network. It works with Mail Transfer Agent.
NFS allows the remote hosts to ride file systems on a network and can interact with other file
systems.
Extra tasks:
Differences between logical and physical tropology-
Logical tropology implies a higher view than the physical one.
Logical tropology shows how the devices are connected to the user where the physical tropology
shows how they are physically connected with wires or cables.
Differences between Connectionless and Connection-oriented communication-
In Connectionless communication, establishment of connection is needless while in Connection-
oriented communication establishment of connection is mandatory.
Connection-oriented communication is better and more reliable while Connectionless
communication is less reliable.
Task 38:
Some of the application layer’s protocols are-
Simple mail transfer protocol (SMTP), Network file system (NFS), File transfer protocol (FTP),
FTP is such a method that actually lets the users to transfer file. Using FTP two computers can
be connected with each other and can transfer files.
SMTP moves user’s emails across the network. It works with Mail Transfer Agent.
NFS allows the remote hosts to ride file systems on a network and can interact with other file
systems.

14
Task 39:
Datagram packet switching is such a technique in which every packet is treated as a separate
entity. They are routed independently across the network and they are sent to the destination.
Extra task:
Differences between UDP and TCP-
TCP is connection-oriented where UDP is connection less. In respect to ordering a product,
customer can track each and every details of the order with TCP. Using UDP they cannot access
the details of the booking.
IP is described as best-way effort delivery-
IP is described as best-way effort delivery because IP does the best to deliver packets from the
source to the destination. While IP cannot take any further steps to recover the lost packets.
IP is good but not better than Transmission Control Protocol (TCP). IP does not guarantee
successful delivery of the packets. If the packets are not sent perfectly, then IP cannot recover
those packets.
Task 40:
Concurrent processing is a model that proposes multiple process can be executed by CPU
simultaneously. This improves the speed of the processor and also provides better performance.
The services are-
The processor should be capable enough to manage multiple processes.
RAM management should be better enough to control those processes.
Task 39:
Datagram packet switching is such a technique in which every packet is treated as a separate
entity. They are routed independently across the network and they are sent to the destination.
Extra task:
Differences between UDP and TCP-
TCP is connection-oriented where UDP is connection less. In respect to ordering a product,
customer can track each and every details of the order with TCP. Using UDP they cannot access
the details of the booking.
IP is described as best-way effort delivery-
IP is described as best-way effort delivery because IP does the best to deliver packets from the
source to the destination. While IP cannot take any further steps to recover the lost packets.
IP is good but not better than Transmission Control Protocol (TCP). IP does not guarantee
successful delivery of the packets. If the packets are not sent perfectly, then IP cannot recover
those packets.
Task 40:
Concurrent processing is a model that proposes multiple process can be executed by CPU
simultaneously. This improves the speed of the processor and also provides better performance.
The services are-
The processor should be capable enough to manage multiple processes.
RAM management should be better enough to control those processes.

15
Task 41:
Operating systems are said to be event driven because the OS execute the process according to
the occurrence of events. Whenever an event occurs, CPU react to it and work accordingly.
Task 42:
File system allow the users to create, manage files in the computers and lets user to store any file
to any location.
It makes the process of sharing files among different users smoothly.
Offers the users to modify the data of files in the directory.
Extra task:
Each and every programme of a computer needs own driver for video card, sound card, and hard
drive. Depending on the programmers it is too hard to programme at the machine level. Users
need to load a compiler before running a programme.
Before loading a programme operating system’s most important job is to manage CPU. If CPU is
free then the CPU will load the programme into the main memory and after that it got executed.
Otherwise if multiple processes are waiting to get executed, then various algorithms are there
that can schedule the programmes. After that they will be executed.
The two methods that are used to provide concurrent operations are multitasking and
multiprogramming.
Advantages of multitasking:
Task 41:
Operating systems are said to be event driven because the OS execute the process according to
the occurrence of events. Whenever an event occurs, CPU react to it and work accordingly.
Task 42:
File system allow the users to create, manage files in the computers and lets user to store any file
to any location.
It makes the process of sharing files among different users smoothly.
Offers the users to modify the data of files in the directory.
Extra task:
Each and every programme of a computer needs own driver for video card, sound card, and hard
drive. Depending on the programmers it is too hard to programme at the machine level. Users
need to load a compiler before running a programme.
Before loading a programme operating system’s most important job is to manage CPU. If CPU is
free then the CPU will load the programme into the main memory and after that it got executed.
Otherwise if multiple processes are waiting to get executed, then various algorithms are there
that can schedule the programmes. After that they will be executed.
The two methods that are used to provide concurrent operations are multitasking and
multiprogramming.
Advantages of multitasking:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16
Multitasking operating system provides more speed to the computer and also saves time.
Multitasking is also better for more production.
Advantages of multiprogramming:
Multiprogramming improves the CPU utilization. CPU organize number of jobs, so CPU always
has something to perform or execute.
Services provided by kernel are-
Kernel schedules programmes to be executed by the CPU.
Kernel should always allocate main memory for executing the processes.
Multitasking operating system provides more speed to the computer and also saves time.
Multitasking is also better for more production.
Advantages of multiprogramming:
Multiprogramming improves the CPU utilization. CPU organize number of jobs, so CPU always
has something to perform or execute.
Services provided by kernel are-
Kernel schedules programmes to be executed by the CPU.
Kernel should always allocate main memory for executing the processes.

17
References
Bach, M.J., 2018. The design of the UNIX operating system.
Kreutz, D., Ramos, F., Verissimo, P., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2014.
Software-defined networking: A comprehensive survey. arXiv preprint arXiv:1406.0440.
Silberschatz, A., Gagne, G. and Galvin, P.B., 2018. Operating system concepts. Wiley.
Tolpygo, S.K., 2016. Superconductor digital electronics: Scalability and energy efficiency
issues. Low Temperature Physics, 42(5), pp.361-379.
Yu, L., El-Damak, D., Ha, S., Ling, X., Lin, Y., Zubair, A., Zhang, Y., Lee, Y.H., Kong, J.,
Chandrakasan, A. and Palacios, T., 2015, December. Enhancement-mode single-layer CVD
MoS2 FET technology for digital electronics. In 2015 IEEE International Electron Devices
Meeting (IEDM) (pp. 32-3). IEEE.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K.C., Crowley, P., Papadopoulos, C.,
Wang, L. and Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), pp.66-73.
References
Bach, M.J., 2018. The design of the UNIX operating system.
Kreutz, D., Ramos, F., Verissimo, P., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2014.
Software-defined networking: A comprehensive survey. arXiv preprint arXiv:1406.0440.
Silberschatz, A., Gagne, G. and Galvin, P.B., 2018. Operating system concepts. Wiley.
Tolpygo, S.K., 2016. Superconductor digital electronics: Scalability and energy efficiency
issues. Low Temperature Physics, 42(5), pp.361-379.
Yu, L., El-Damak, D., Ha, S., Ling, X., Lin, Y., Zubair, A., Zhang, Y., Lee, Y.H., Kong, J.,
Chandrakasan, A. and Palacios, T., 2015, December. Enhancement-mode single-layer CVD
MoS2 FET technology for digital electronics. In 2015 IEEE International Electron Devices
Meeting (IEDM) (pp. 32-3). IEEE.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K.C., Crowley, P., Papadopoulos, C.,
Wang, L. and Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), pp.66-73.
1 out of 18

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.