第三章 习题课
第三章习题解析(习题课)
第三章1、110KV 线路等值电路如图所示,已知末端电压为112KV ,末端功率s2~=4+j 4 (MV A), 线路阻抗Z=2+j4(Ω)。
求始端电压和始端功率,并作出电压向量图。
1U2U解:设2U与实轴重合,则: Z U S U U *⎪⎪⎭⎫ ⎝⎛+=2221~ )42(11244112j j +-+= )112816()112168112(-+++=j 0714.0)214.0112(j ++=0714.0214.112j +=U 1=()220714.0214.0112++=310098.512592-⨯+ =112.2KV214.01120714.01+=-tg δ=O 036.0Z S ~∆=222~⎪⎪⎭⎫ ⎝⎛U S Z =R U Q P 222222++X U Q P j 222222+411244211244222222⨯++⨯+=j MVA j 0102.00051.0+=MVA j j j S S S Z 0102.40051.40102.04)0051.04(~~21+=+++=∆+=电压向量图如图所示:2、 如图3-1线路,负荷由发电厂母线经110kV 单回线路供电,线路长80kM ,型号为LGJ —95,线间几何均距5M .发电厂母线电压U 1=116kV ,受端负荷L S ~=15+j10MV A 求出输出线路的功率损耗及受端电压U 2。
U U LS ~解:对线路LGJ —95有:km r /33.01Ω= km X /429.01Ω=S /km 102.65b -61⨯=)(4.268033.0Ω=⨯=R ,)(32.3480429.0Ω=⨯=XS B 461012.2801065.2--⨯=⨯⨯=,S B 41006.121-⨯= 等值电路如图所示第一步由末端向首端推算功率,设全网电压为额定电压kv U N 11000=∠ 末端导纳支路:MVA j S j B jU S Y 283.11006.11102/~42222-=⨯⨯-=-=∆- 阻抗末端功率 M V A j j j S S S y 717.815283.11015~~~22'2+=-+=∆+=∆ 阻抗的功率损耗)(~22222jX R U Q P S NZ +''=∆+)32.344.26(110717.815222j ++=MVA j 854.0657.0+= 阻抗首端功率为S ~S ~S ~z21'''∆+==15+j8.717+0.657+j0.854=15.657+j9.571 MV A首端功率为=S ~1SS ~Y11∆+'=15.657+j9.571-j1.283=15.657+j8.288MV A第二步用求得的=S ~1和已知的U 1,由首端向末端推算电压。
吴传生 经济数学 微积分 第二版 第三章 习题课PPT
f (e ) e 1
(9) 设f ( x ) x( x 1)( x 2)( x 1000), f (0) 1000 !
解: f (0) lim f ( x ) f (0)
x 0
x
lim( x 1)( x 2) ( x 1000)
x0
且:f (0) f (0)
f ( x )在x 0点可导
sin x x 0 例7 设f ( x ) , 求 f ( x ) x0 x 解: 0时,f ( x ) (sin x ) cos x x
x 0时,f ( x ) ( x ) 1
x 0
f ( x )在x 0处左连续,
x0
lim f ( x ) lim x 1 1 x )( 1 1 ) 0 f (0) (
x0
f f ( x )在x 0处右连续,( x )在x 0处连续;
1 x 0 ln( x 1) [设 f ( x ) , 讨 论f ( x )在 x 1 1 x 0 x 1 x 0处的 连续性和 可导性 ]
第三章 习 题 课
一 教学要求
二 内容提要
三 教材习题选解
P113,T3
四 典型例题分析
例1 填空:
x (1) 设f ( x0 ) 1, 则 lim x 0 f ( x 2 x ) f ( x x ) 0 0
1
解: lim f ( x0 2 x ) f ( x0 x ) x 0 x [ f ( x0 2 x ) f ( x0 )] [ f ( x0 x ) f ( x0 )] lim x 0 x f ( x0 2 x ) f ( x0 ) f ( x0 x ) f ( x0 ) lim lim x 0 x 0 x x f ( x0 2 x ) f ( x0 ) f ( x0 x ) f ( x0 ) 2 lim lim 2 x 0 x 0 2x x 2 f ( x0 ) f ( x0 ) f ( x0 ) 1 原式 1
高等数学第三章习题课答案
第三章 微分中值定理习题课一、判断题(每题3分)1.函数)(x f 在0x 点处可导,且在0x 点处取得极值,那么0)(0='x f .( √ )2.函数)(x f 在0x 点处可导,且0)(0='x f ,那么)(x f 在0x 点处取得极值.( × )3.若0x 是()f x 的极值点,则0x 是()f x 的驻点. ( × )4.函数()x f 在区间()b a ,内的极大值一定大于极小值 . ( × )5.若()0,(,)f x x a b ''>∈,则()f x '在(,)a b 内单调增加 .( √ )6.0()0f x '=且0()0f x ''<是函数()y f x =在0x 处取得极大值的充要条件. ( × )7.函数()arctan f x x x =的图形没有拐点. ( √ )8.因为函数y =0x =点不可导,所以()0,0点不是曲线y =.( × )二、选择题(每题3分)1.下列函数中,在闭区间[-1,1]上满足罗尔定理条件的是( D ). A .xe B .ln x C .x D .21x - 2.对于函数()211f x x=+,满足罗尔定理全部条件的区间是( D ). (A )[]2,0-;(B )[]0,1;(C );[]1,2-(D )[]2,2-3. 设函数()()()12sin f x x x x =--,则方程()0f x '=在 (0,)π内根的个数( D )(A) 0个 ; (B)至多1个; (C) 2个; (D)至少3个.4.已知函数3()2f x x x =+在区间[0,1]上满足拉格朗日中值定理的条件,使得该定理成立的ξ=( D ).(A )13 (B (C )12 (D 5.若函数)(),(x g x f 在区间),(b a 上的导函数相等,则该两函数在),(b a 上( C ). A.不相等 B .相等 C.至多相差一个常数 D.均为常数6.arcsin y x x =- 在定义域内( B ).A. 单调减函数B.单调增函数C. 有单调增区间也有单调减区间D. 没有单调性7. 函数2129223-+-=x x x y 的单调减少区间是 ( C ). (A )),(+∞-∞ (B ))1,(-∞(C ))2,1((D )),2(+∞8.设(),a b 内()0f x ''>,则曲线()y f x =在(),a b 内的曲线弧位于其上任一条切线的( A ). (A )上方;(B )下方; (C )左方; (D )右方.9.曲线32y ax bx =+的拐点为(1,3),则 ( A ). (A )3,30a b a b +=+= (B )0,30a b a b +=+= (C )2,320a b a b +=+=(D )0,340a b a b +<+=10. 设函数()y f x =在开区间(,)a b 内有()'0f x <且()"0f x <,则()y f x =在(,)a b 内( C )A.单调增加,图像是凹的B.单调减少,图像是凹的C.单调减少,图像是凸的D. 单调增加,图像是凸的11.函数2y ax c =+在区间()0,+∞内单调增加,则a 和c 应满足( C ).(A )0a <且0c =; (B )0a >且c 是任意实数; (C )0a <且0c ≠;(D )0a <且c 是任意实数.12. 函数23++=x x y 在其定义域内( B ) (A )单调减少 (B) 单调增加 (C) 图形是凹的(D) 图形是凸的13.若()()00,x f x 为连续曲线()y f x =上凹弧与凸弧的分界点,则( A ). (A )()()00,x f x 必为曲线的拐点; (B )()()00,x f x 必为曲线的驻点; (C )0x 点必为曲线的极值点;(D )0x x =必为曲线的拐点.14.函数()2ln f x x x =-的驻点是( B ).(A )1x = (B )12x =(C )(1,2) (D) 1(,1ln 2)2+15.函数2ln(1)y x x =-+的极值( D ). A .是1ln 2-- B .是0D.不存在 C.是1ln216.设()[0,1]()f x x f x ''=在上有<0,则下述正确的是( A )( A ) (1)f '<)0()1(f f -<(0)f '; ( B ) (0)f '<)0()1(f f -<(1)f '; ( C ) (1)f '<(0)f '<)0()1(f f -; ( D ) (0)f '<(1)f '<)0()1(f f -17.设()f x 具有二阶连续的导数,且20()lim3,ln(1)x f x x →=-+则(0)f 是()f x 的( A )(A )极大值; (B )极小值; (C )驻点; (D )拐点.18.设函数()y f x =在0x x =处有()0f x '=0,在1x x =处导数不存在,则( C ). A. 0x x =,1x x =一定都是极值点 B.只有0x x =可以是极值点C. 0x x =, 1x x =都可能不是极值点D. 0x x =,1x x =至少有一个是极值点三、解答题(求极限每题4分其余每题 8分) 1.求极限220000011sin sin 1cos 2(1)lim lim lim lim lim 0sin sin 22→→→→→---⎛⎫-===== ⎪⎝⎭x x x x x x x x x x x x x x x x x x (2)11lim 1ln x xx x →⎛⎫⎪⎝⎭-- =()()11ln 1ln 11limlim 11ln ln x x x x x x x x x x x→→--+-=--+11ln ln 11limlim ln 1ln 22x x x x x x x x x →→+===+-+0(3)11lim 1→⎛⎫ ⎪⎝⎭--x x x e 01lim (1)→--=-xx x e x x e 0011lim lim 12xxx x x x x x x e e e xe e e xe →→-===-+++ (4)200011ln(1)ln(1)lim()lim lim ln(1)ln(1)x x x x x x x x x x x x →→→-+-+-==++0011111limlim lim 22(1)2(1)2x x x x x x x x x →→→-+====++20sin (5)limtan →-x x xx x 2200sin 1cos lim limtan 3x x x x x x x x →→--==0sin 1lim 66x x x →==222201(6)lim(1)→---x x x e xx e 22401lim→--=x x e xx 2232002211lim lim 42x x x x xe x e x x →→--==12=2223220000tan tan sec 1tan 1(7)lim lim lim lim ln(1)333→→→→---====+x x x x x x x x x x x x x x x1ln 1(8)lim cot →+∞⎛⎫+ ⎪⎝⎭x x arc x 1lim cot →+∞=x x arc x 222211lim lim 111x x x x x x x →+∞→+∞-+===+-+sin sin cos (9)limlim cos 1→→-==-x a x a x a xa x a22200021sec 77ln tan 7tan 2sec 77tan 7(10)lim lim lim 11ln tan 2tan 7sec 22sec 22tan 2+++→→→⋅⋅⋅===⋅⋅⋅x x x x x x x x x x x x x(11)lim arctan 2→+∞⎛⎫- ⎪⎝⎭x x x π22221arctan 12lim limlim 1111→+∞→+∞→+∞--+====+-x x x x x x x xxπ2lim ln(arctan )2(12)lim arctan →+∞→+∞⎛⎫= ⎪⎝⎭x xx x x x e ππ2lim ln(arctan )→+∞x x x π222211ln arctan lnln arctan arctan 1limlimlim 111→+∞→+∞→+∞+⋅+===-x x x x x x x xxxππ2222lim 1x x x ππ→+∞=-=-+ 22lim arctan -→+∞⎛⎫∴= ⎪⎝⎭xx x e ππ .()tan 21(13)lim 2→-x x x π解:()()()11sin ln 22limlim tan ln 2cos tan 2221lim 2x x x x x x xx x x eeππππ→→--→-==1122sinlim22x xx e eπππ→---⋅==tan 0(14)1lim +→⎛⎫⎪⎝⎭xx x 0011lim tan lnlim ln++→→⋅⋅==x x x x xxee2001110ln limlim1x x x xx xe ee++→→---====2. 验证罗尔中值定理对函数32452y x x x =-+-在区间[]0,1上的正确性.解:()f x 在闭区间[]0,1上连续,在开区间()0,1内可导,()()012f f ==-满足罗尔定理条件.(3分)令()2121010f x x x '=-+=,得()0,1x =,满足罗尔定理结论.3. 试证明对函数2y px qx r =++应用拉格朗日中值定理时所求得的点ξ总是位于区间的正中间.证明:在区间[],a b 上,()()()f b f a f b aξ-'=- 代入:()()222pb qb r pa qa r p q b aξ++-++=+-解得:2a bξ+=. 4. 证明方程531xx -=在()1,2之间有且仅有一个实根.证明:令()531f x x x =--,()11310f =--<, ()522610f =-->所以 ()0f x =在()1,2上至少一个根,又()4'53f x x =-,当()1,2x ∈时()'0f x >,所以单增,因此在()1,2上至多有一个根.()0f x =在()1,2上有且仅有一个根.5. 设()f x 在[,]a b 上连续,在(,)a b 内可导,且()()0f a f b ==,证明:至少存在一个(,)a b ξ∈,使得()()0f f ξξ'+=. 提示:令()()x F x e f x =证明:令()()xF x e f x =,显然()F x 在[,]a b 上连续,在(,)a b 内可导, 且()()()()x F x e f x f x ''=+ (3分)由Larange 中值定理,则至少(,)a b ξ∈,使得()()()F b F a F b aξ-'=-又()()0f a f b == ∴()()0f f ξξ'+=6. 设()f x 在[0,]a 上连续,在(0,)a 内可导,且()0f a =,证明存在一点(0,)a ξ∈,使得()()0f f ξξξ'+=.提示:令 ()()F x xf x =.证明:构造辅助函数()()F x xf x =, ()f x 在[0,]a 上连续,在(0,)a内可导∴()F x 在[0,]a 上连续,在(0,)a 内可导,()()()F x f x xf x ''=+且(0)()0F F a ==由Rolle 定理,至少(0,)a ξ∃∈,有()0F ξ'= 即()()0f f ξξξ'+=7. 证明:不论b 取何值,方程033=+-b x x 在区间[]1,1-上至多有一个实根证:令()()()()323,33311f x x x b f x x x x '=-+=-=+-()1,1x ∈-时,0,,f f'<故()f x 在区间[]1,1-上至多有一个实根.8. 证明:当1x >时,xe x e >⋅.证明: 令()xf x e x e =-⋅,显然()f x 在[1,]x 上满足Lagrange 中值定理的条ξ∈,使得件,由中值定理,至少存在一点(1,)x()(1)(1)()(1)()f x f x f x e e ξξ'-=-=--即()(1)0f x f >=又即x e x e >⋅9. 证明:当0x >时,112x +>证:()()111022f x x f x '=+==>()()00f x f >=,即有112x +>10. 求证:1,(0,)>+∈+∞xex x证明:令()1,,[0,)xf x e x x =--∈+∞当(0,)x ∈+∞时,()10x f x e '=->故在区间[0,)+∞上,()f x 单调递增从而当(0,)x ∈+∞时,()(0)0f x f >=即1x e x >+或者:证明:()221112!2xf e e x x x x x ξξ''=++=++>+……8分11. 当1>x 时,证明:13>-x. 答案参看课本p148 例6 12. 证明:当0x >时, ln(1).1xx x x<+<+ 答案参看课本P132 例1 13. 设0,1a b n >>>, 证明:11()()n n n n nba b a b na a b ---<-<-.证明:令()nf x x =,显然()f x 在[,]b a 上满足lagrange 定理条件,故至少存在一点(,)b a ξ∈,使得()()()()f a f b f a b ξ'-=- 即1()n n n a b n a b ξ--=-又由b a ξ<<及1(1)n n n ξ->的单增性,得11()()n n n n nba b a b na a b ---<-<-14. 设0a b >>,证明:ln a b b a ba a b--<< 证明:令()ln f x x =,在区间[],b a 上连续,在区间(,)b a 内可导,有拉格朗日中值定理,至少存在一点(),b a ξ∈,使得1ln ln ()a b a b ξ-=-,又因为1110,a b ξ<<<因此,ln a b a a ba b b--<<. 15. 证明恒等式()arcsin arccos ,112x x x π+=-≤≤.证:令()arcsin arccos f x x x =+ 则()f x 在[]1,1-上连续.在()1,1-内有:()0,f x f C '=≡≡令0,,arcsin arccos 22x C x x ππ==+=在()1,1-内成立.再根据()f x 在[]1,1-上的连续性,可知上式在[]1,1-上成立.16. 求函数2y x =的极值点和单调区间. 解:132(1)y x-'=-因此,2y x =在定义域(,)-∞+∞内有不可导点10x =和驻点21x =17. 求函数32535y x x x =-++的单调区间,拐点及凹或凸的区间. 解:23103y x x '=-+,易得函数的单调递增区间为1(,)(3,)3-∞+∞,单调减区间1(,3)3.610y x ''=-,令0y ''=,得53x =. 当53x -∞<<时,0y ''<,因此曲线在5(,]3-∞上是凸的;当53x <<+∞时,0y ''>,因此曲线在5[,)3+∞上是凹的,故520(,)327是拐点18. 试确定,,a b c 的值,使曲线32y x ax bx c =-++在(1,1-)为一拐点,在0x =处有极值,并求曲线的凹凸区间.解:232y x ax b '=-+ 62y x a ''=-(1,1)-为拐点,则062a =- 3a ∴=由0y '=,则2360x x b -+= , 代入0x =,则0b =.11,1a b c c -++=-=曲线为3231y x x =-+, 66y x ''=-. 凸区间为(,1)-∞-, 凹区间为(1,)+∞.19. 求函数()7ln 124-=x x y 的单调区间,拐点及凹或凸的区间.解: 34314(12ln 7)124(12ln 4)y x x x x x x'=-+⋅⋅=-, 易得函数的单调递增区间为13(,)e +∞,单调减区间13(0,)e . ()232112(12ln 4)412144ln 0y x x x x x x x''=-+⋅⋅=>, 令0y ''=,得1x =.当01x <<时,0y ''<,因此曲线在(0,1]上是凸的;当1x <<+∞时,0y ''>,因此曲线在[1,)+∞上是凹的,故(1,7)-是拐点 20. 求函数arctan xy e=的单调区间,拐点及凹或凸的区间.解:arctan 211x y e x '=⋅+>0,因此单调增区间是R , arctan arctan arctan 2222221212(1)(1)(1)xx x x x y e e e x x x ⎡⎤⎡⎤-''=+-=⎢⎥⎢⎥+++⎣⎦⎣⎦, 令0y ''=,得12x =. 当12x -∞<<时,0y ''>,因此曲线在1(,]2-∞上是凹的; 当12x <<+∞时,0y ''<,因此曲线在1[,)2+∞上是凸的,故1arctan 21(,)2e是拐点 21. 求函数1234+-=x x y 的拐点和凹凸区间. 解:3246y x x '=- 2121212(1)y x x x x ''=-=- 令0y ''=,得10x =,21x = 列表 (4分)22. 求函数32391=+-+y x x x 的极值.解:2'3693(1)(3)y x x x x =+-=-+ ''66y x =+ 令0'=y 得驻点:121,3x x ==-.当21x =时,''0,y >取得极小值,其值为4-. 当33x =-时,''0y <,取得极大值,其值为28.23. 求函数23(1)1=-+y x 的极值.解: 226(1)y x x '=-22226(1)24(1)y x x x ''=-+-令0y '=,得1231,0,1x x x =-==(0)60y ''=>,故20x =是极小值点.(1)0y ''±=, 无法用第二充分条件进行判定.在11x =-的附近的左右两侧取值均有0y '<,故11x =-不是极值点. 在21x =的附近的左右两侧取值均有0y '>,故21x =不是极值点. 极小值(0)0y =24. 求函数32(1)(23)=-+y x x 的极值点和单调区间.解:22323(1)(23)4(1)(23)(1)(23)(105)0y x x x x x x x '=-++-+=-++=所以,驻点11x =,232x =-,312x =- 列表∴()f x 在32x =-处取得极大值3()02f -= ()f x 在12x =-处取得极小值127()22f -=- 单调递增区间31(,],[,)22-∞--+∞,单调递增区间31[,]22-- 25. 试问a 为何值时,函数1()sin sin 23=+f x a x x 在3π处取得极值?它是极大值还是极小值?并求此极值.解:2()cos cos23f x a x x '=+()f x在3π处取得极值22121()coscos 03333232f a a πππ'∴=+=⋅-⋅= 23a ∴=即 ()2()cos cos 23f x x x '=+ ()2()sin 2sin 23f x x x ''∴=--222()sin 2sin 2033333f πππ⎛⎫''∴=--=-⋅+< ⎪⎝⎭⎝⎭所以它是极大值,极大值为212()sin sin 33333f πππ∴=+=26. 求函数3223y x x =-在区间[]1,4上的最大值与最小值.解:212660,0,1y x x x x '=-===(舍去x =)()()11,480,f f =-=,故最大值为80,最小值为-1.27.、某车间靠墙壁要盖一间长方形小屋,现有存砖只够砌20m 长的墙壁.问应围成怎样的长方形才能使这间小屋的面积最大?解:设小屋长 x m ,宽 y m ,220,102xx y y +==-.2101022x x S x x ⎛⎫=-=- ⎪⎝⎭,100,10S x x '=-==故小屋长10米,宽5米时,面积最大.28.某厂每批生产产品x 单位的总费用为()5200C x x =+(元), 得到的收入是()2100.01R x x x =-(元).问每批生产多少个单位产品时总利润()L x 最大?解:()()()22100.0152000.015200L x x x x x x =--+=-+-()0.0250,250L x x x '=-+==(单位)()0.020L x ''=-<,故250x =单位时总利润最大.-----精心整理,希望对您有所帮助!。
自动控制原理黄坚 第二版 第三章习题答案
e
-1.8
第三章习题课 (3-6)
3-6 已知系统的单位阶跃响应: -60t -10t c(t)=1+0.2e -1.2e (1) 求系统的闭环传递函数。 (2) 求系统的阻尼比和无阻尼振荡频率。 1 + 0.2 - 1.2 = 600 解: C(s)= s s+60 s+10 s(s+60)(s+10) 1 C(s)= 600 R(s)= s R(s) s2+70s+600 ω n=24.5 ζ 2 ω n=70 ω n2 =600 ζ=1.43
s(s+1)
10
C(s)
1 1 b31 10
τ 10 10
10( s+1) τ Φ(s)= s3 +s2+10 s+10 τ 10 -10 >0 τ b31= 1 τ >1
第三章习题课 (3-16)
3-16 已知单位反馈系统的开环传递函数, 试求K p、Kv和Ka .并求稳态误差ess. 1+ 2+ 2 2 R(s)= s r(t)=I(t)+2t+t s 2 s3 10 10(2s+1) = 解: (1) G(s)=200 20= 2 (2s+1) (2) G(s)= s(s+2)(s+10) s(0.5s+1)(0.1s+1) (3) G(s)= s2(s2(0.1s+1)(0.2s+) 2+0.4s+1) +4s+10) s (0.1s R0 1 Kp=20=∞ ess1=ss1=0 =21 eess1=0 Kpp K=∞ 1+K υ=1 υ=0 υ=2 K =0υ=10 ess2=∞ = 2 = 2 eess2=0 10 ss2 K K υ K υ=∞ =∞=∞ K =1 ess3eess3=2 Ka=0aa=0 ss3 K essess=∞=2 =∞ess
线性代数第三章矩阵的逆(习题课)
目录
• 矩阵的逆的定义和性质 • 逆矩阵的运算规则 • 逆矩阵的应用 • 习题解析与解答
01
矩阵的逆的定义和性质
定义与性质
逆矩阵的定义
如果存在一个矩阵A-1,使得A*A-1=I (单位矩阵),则称A为可逆矩阵, A-1为A的逆矩阵。
逆矩阵的性质
若A是可逆矩阵,则A的逆矩阵A-1也 是可逆矩阵,且(A-1)-1=A。同时, 若B是A的逆矩阵,则AB=BA=I。
03
逆矩阵的应用
解线性方程组
线性方程组
线性方程组是数学中一个常见的 问题,它涉及到多个未知数和方 程。通过矩阵的逆,我们可以找 到线性方程组的解。
求解步骤
首先,将系数矩阵进行转置,然 后计算其行列式值。如果行列式 值不为零,则存在唯一解。最后, 通过矩阵的逆计算出线性方程组 的解。
应用场景
线性方程组广泛应用于各个领域, 如物理、工程、经济等。通过矩 阵的逆,我们可以更高效地解决 这些领域中的问题。
综合题2解析
题目要求求一个给定矩阵的逆矩阵, 并判断其是否可逆。同时,我们需要 解决一个与该矩阵相关的问题。首先 ,我们判断矩阵是否可逆。如果可逆 ,我们再使用公式法或分块法计算逆 矩阵。然后,我们将逆矩阵应用于实 际问题中以获得解决方案。
综合题目3解析
题目要求求多个给定矩阵的乘积的逆 矩阵,并验证其正确性。同时,我们 需要解决一个与这些矩阵相关的问题 。首先,我们计算多个给定矩阵的乘 积。然后,我们使用公式法或分块法 计算其逆矩阵。最后,我们通过乘以 其原矩阵来验证逆矩阵的正确性。同 时,我们将逆矩阵应用于实际问题中 以获得解决方案。
量βi;最后,计算P^(-1)AP=B。
2024年人教版七年级生物上册 第三章 从细胞到生物体 第三节 植物体的结构层次(习题课件)
A. 分生组织
B. 保护组织
C. 薄壁组织
D. 输导组织
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
8. 与耙耙柑属于同一结构层次的是( C )
A. 洋葱表皮
B. 西瓜瓤
C. 一朵花
D. 一棵树
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
(2)西瓜果实属于植物的 生殖 器官。成熟的西瓜甜美多 汁,其中果汁主要来自瓜瓤细胞结构中的 液泡 ;种下 西瓜种子,又结出了西瓜,决定这种现象的物质主要存在 于细胞的 细胞核 中。
(3)西瓜的果肉细胞,细胞壁薄,贮藏了丰富的营养物质,属 于 薄壁 组织;吃剩下的瓜皮细胞排列紧密,能够减少 水分散失和抵御外力破坏,属于 保护 组织。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
12. 【创新题】热带植物海芋受伤时会从根部输送毒液到伤 口处。而锚阿波萤叶甲(一种昆虫)食用海芋叶之前,会 在叶中间切割出一个圆圈以免中毒,推测其主要目的是 切断叶的( B )
A. 保护组织 C. 薄壁组织
B. 输导组织 D. 分生组织
第一单元 生物和细胞 第三章 从细胞到生物体 第三节 植物体的结构层次
输导 薄壁
根
叶
果实
绿色开花植物有六大器官
1. 下列蔬菜中,我们食用的部分属于生殖器官的是( C )
A. 萝卜
B. 莲藕
C. 茄子
D. 白菜
点拨:绿色植物有六大器官:根、茎、叶、花、果实、种
子,其中根、茎、叶为营养器官,花、果实、种子为生殖
第三章 存储系统 习题课
• 可以将图中的A15与A10接线颠倒一下, 可以将图中的A15与A10接线颠倒一下, A15 接线颠倒一下 原来的7C00H~7FFFH 原来的7C00H~7FFFH A15~A10=011111) (A15~A10=011111)就变为 • F800H~FBFFH(A15~A10=111110), F800H~FBFFH(A15~A10=111110), 与另一部分FC00H~FFFFH FC00H~FFFFH成为地址连 与另一部分FC00H~FFFFH成为地址连 续的存储器。 续的存储器。 • 6、试用Intel 2116构成64K X 8bit的存储 试用Intel 2116构成 构成64K 8bit的存储 该存储器采用奇偶校验。 器,该存储器采用奇偶校验。 • (1)求共需要多少片2116芯片? 求共需要多少片2116芯片? 2116芯片 • (2)画出存储体连接示意图; 画出存储体连接示意图; • (3)写出各芯片RAS*和CAS*的形成条 写出各芯片RAS* CAS*的形成条 RAS*和 件;
• 6、RAM中的任何一个单元都可以随时 RAM中的任何一个单元都可以随时 访问。 访问。 • 7、ROM中的任何一个单元不能随机访 ROM中的任何一个单元不能随机访 问。 一般情况下,ROM和RAM在主存储 8、一般情况下,ROM和RAM在主存储 器中是统一编址的。 器中是统一编址的。 在当今的计算机系统中, • 9、在当今的计算机系统中,存储器是数 据传送的中心, 据传送的中心,但访问存储器的请求是 CPU或I/O发出的 发出的。 由CPU或I/O发出的。 • 10、EPROM是可改写的,因而也是随机 10、EPROM是可改写的 是可改写的, 存储器的一种。 存储器的一种。 • 11、DRAM和SRAM都是易失性半导体存 11、DRAM和SRAM都是易失性半导体存 储器。 储器。
3. 第三章课后习题及答案
第三章1. (Q1) Suppose the network layer provides the following service. The network layer in the source host accepts a segment of maximum size 1,200 bytes and a destination host address from the transport layer. The network layer then guarantees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host.a. Design the simplest possible transport-layer protocol that will get application data to thedesired process at the destination host. Assume the operating system in the destination host has assigned a 4-byte port number to each running application process.b. Modify this protocol so that it provides a “return address” to the destination process.c. In your protocols, does the transport layer “have to do anything” in the core of the computernetwork.Answer:a. Call this protocol Simple Transport Protocol (STP). At the sender side, STP accepts from thesending process a chunk of data not exceeding 1196 bytes, a destination host address, and a destination port number. STP adds a four-byte header to each chunk and puts the port number of the destination process in this header. STP then gives the destination host address and the resulting segment to the network layer. The network layer delivers the segment to STP at the destination host. STP then examines the port number in the segment, extracts the data from the segment, and passes the data to the process identified by the port number.b. The segment now has two header fields: a source port field and destination port field. At thesender side, STP accepts a chunk of data not exceeding 1192 bytes, a destination host address,a source port number, and a destination port number. STP creates a segment which contains theapplication data, source port number, and destination port number. It then gives the segment and the destination host address to the network layer. After receiving the segment, STP at the receiving host gives the application process the application data and the source port number.c. No, the transport layer does not have to do anything in the core; the transport layer “lives” inthe end systems.2. (Q2) Consider a planet where everyone belongs to a family of six, every family lives in its own house, each house has a unique address, and each person in a given house has a unique name. Suppose this planet has a mail service that delivers letters form source house to destination house. The mail service requires that (i) the letter be in an envelope and that (ii) the address of the destination house (and nothing more ) be clearly written on the envelope. Suppose each family has a delegate family member who collects and distributes letters for the other family members. The letters do not necessarily provide any indication of the recipients of the letters.a. Using the solution to Problem Q1 above as inspiration, describe a protocol that thedelegates can use to deliver letters from a sending family member to a receiving family member.b. In your protocol, does the mail service ever have to open the envelope and examine theletter in order to provide its service.Answer:a.For sending a letter, the family member is required to give the delegate the letter itself, theaddress of the destination house, and the name of the recipient. The delegate clearly writes the recipient’s name on the top of the letter. The delegate then puts the letter in an e nvelope and writes the address of the destination house on the envelope. The delegate then gives the letter to the planet’s mail service. At the receiving side, the delegate receives the letter from the mail service, takes the letter out of the envelope, and takes note of the recipient name written at the top of the letter. The delegate than gives the letter to the family member with this name.b.No, the mail service does not have to open the envelope; it only examines the address on theenvelope.3. (Q3) Describe why an application developer might choose to run an application over UDP rather than TCP.Answer:An application developer may not want its application to use TCP’s congestion control, which can throttle the application’s sending rate at times of congestion. Often, designers of IP telephony and IP videoconference applications choose to run their applications over UDP because they want to avoid TCP’s congestion control. Also, some applications do not need the reliable data transfer provided by TCP.4. (P1) Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers fora. The segment sent from A to B.b. The segment sent from B to S.c. The segment sent from S to A.d. The segment sent from S to B.e. If A and B are different hosts, is it possible that the source port number in the segment fromA to S is the same as that fromB to S?f. How about if they are the same host?Yes.f No.5. (P2) Consider Figure 3.5 What are the source and destination port values in the segmentsflowing form the server back to the clients’ processes? What are the IP addresses in the network-layer datagrams carrying the transport-layer segments?Answer:Suppose the IP addresses of the hosts A, B, and C are a, b, c, respectively. (Note that a,b,c aredistinct.)To host A: Source port =80, source IP address = b, dest port = 26145, dest IP address = a To host C, left process: Source port =80, source IP address = b, dest port = 7532, dest IP address = cTo host C, right process: Source port =80, source IP address = b, dest port = 26145, dest IP address = c6. (P3) UDP and TCP use 1s complement for their checksums. Suppose you have the followingthree 8-bit bytes: 01101010, 01001111, 01110011. What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is , why not just sue the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a 1-bit error will go undetected? How about a 2-bit error?Answer:One's complement = 1 1 1 0 1 1 1 0.To detect errors, the receiver adds the four words (the three original words and the checksum). If the sum contains a zero, the receiver knows there has been an error. All one-bit errors will be detected, but two-bit errors can be undetected (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a 1).7. (P4) Suppose that the UDP receiver computes the Internet checksum for the received UDPsegment and finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain that no bit errors have occurred? Explain.Answer:No, the receiver cannot be absolutely certain that no bit errors have occurred. This is because of the manner in which the checksum for the packet is calculated. If the corresponding bits (that would be added together) of two 16-bit words in the packet were 0 and 1 then even if these get flipped to 1 and 0 respectively, the sum still remains the same. Hence, the 1s complement the receiver calculates will also be the same. This means the checksum will verify even if there was transmission error.8. (P5) a. Suppose you have the following 2 bytes: 01001010 and 01111001. What is the 1scomplement of sum of these 2 bytes?b. Suppose you have the following 2 bytes: 11110101 and 01101110. What is the 1s complement of sum of these 2 bytes?c. For the bytes in part (a), give an example where one bit is flipped in each of the 2 bytesand yet the 1s complement doesn’t change.0 1 0 1 0 1 0 1 + 0 1 1 1 0 0 0 0 1 1 0 0 0 1 0 1 1 1 0 0 0 1 0 1 + 0 1 0 0 1 1 0 0 0 0 0 1 0 0 0 1Answer:a. Adding the two bytes gives 10011101. Taking the one’s complement gives 01100010b. Adding the two bytes gives 00011110; the one’s complement gives 11100001.c. first byte = 00110101 ; second byte = 01101000.9. (P6) Consider our motivation for correcting protocol rdt2.1. Show that the receiver, shown inthe figure on the following page, when operating with the sender show in Figure 3.11, can lead the sender and receiver to enter into a deadlock state, where each is waiting for an event that will never occur.Answer:Suppose the sender is in state “Wait for call 1 from above” and the receiver (the receiver shown in the homework problem) is in state “Wait for 1 from below.” The sender sends a packet with sequence number 1, and transitions to “Wait for ACK or NAK 1,” waiting for an ACK or NAK. Suppose now the receiver receives the packet with sequence number 1 correctly, sends an ACK, and transitions to state “Wait for 0 from below,” waiting for a data packet with sequence number 0. However, the ACK is corrupted. When the rdt2.1 sender gets the corrupted ACK, it resends the packet with sequence number 1. However, the receiver is waiting for a packet with sequence number 0 and (as shown in the home work problem) always sends a NAK when it doesn't get a packet with sequence number 0. Hence the sender will always be sending a packet with sequence number 1, and the receiver will always be NAKing that packet. Neither will progress forward from that state.10. (P7) Draw the FSM for the receiver side of protocol rdt3.0Answer:The sender side of protocol rdt3.0 differs from the sender side of protocol 2.2 in that timeouts have been added. We have seen that the introduction of timeouts adds the possibility of duplicate packets into the sender-to-receiver data stream. However, the receiver in protocol rdt.2.2 can already handle duplicate packets. (Receiver-side duplicates in rdt 2.2 would arise if the receiver sent an ACK that was lost, and the sender then retransmitted the old data). Hence the receiver in protocol rdt2.2 will also work as the receiver in protocol rdt 3.0.11. (P8) In protocol rdt3.0, the ACK packets flowing from the receiver to the sender do not havesequence numbers (although they do have an ACK field that contains the sequence number of the packet they are acknowledging). Why is it that our ACK packets do not require sequence numbers?Answer:To best Answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate of an already received data packet. In the case of ACKs, the sender does not need this info (i.e., a sequence number on an ACK) to tell detect a duplicate ACK. A duplicate ACK is obvious to the rdt3.0 receiver, since when it has received the original ACK it transitioned to the next state. The duplicate ACK is not the ACK that the sender needs and hence is ignored by the rdt3.0 sender.12. (P9) Give a trace of the operation of protocol rdt3.0 when data packets and acknowledgmentpackets are garbled. Your trace should be similar to that used in Figure 3.16Answer:Suppose the protocol has been in operation for some time. The sender is in state “Wait for call fro m above” (top left hand corner) and the receiver is in state “Wait for 0 from below”. The scenarios for corrupted data and corrupted ACK are shown in Figure 1.13. (P10) Consider a channel that can lose packets but has a maximum delay that is known.Modify protocol rdt2.1 to include sender timeout and retransmit. Informally argue whyyour protocol can communicate correctly over this channel.Answer:Here, we add a timer, whose value is greater than the known round-trip propagation delay. We add a timeout event to the “Wait for ACK or NAK0” and “Wait for ACK or NAK1” states. If the timeout event occurs, the most recently transmitted packet is retransmitted. Let us see why this protocol will still work with the rdt2.1 receiver.• Suppose the timeout is caused by a lost data packet, i.e., a packet on the senderto- receiver channel. In this case, the receiver never received the previous transmission and, from the receiver's viewpoint, if the timeout retransmission is received, it look exactly the same as if the original transmission is being received.• Suppose now that an ACK is lost. The receiver will eventually retransmit the packet on atimeout. But a retransmission is exactly the same action that is take if an ACK is garbled. Thus the sender's reaction is the same with a loss, as with a garbled ACK. The rdt 2.1 receiver can already handle the case of a garbled ACK.14. (P11) Consider the rdt3.0 protocol. Draw a diagram showing that if the network connectionbetween the sender and receiver can reorder messages (that is, that two messagespropagating in the medium between the sender and receiver can be reordered), thenthe alternating-bit protocol will not work correctly (make sure you clearly identify thesense in which it will not work correctly). Your diagram should have the sender on theleft and the receiver on the right, with the time axis running down the page, showingdata (D) and acknowledgement (A) message exchange. Make sure you indicate thesequence number associated with any data or acknowledgement segment.Answer:15. (P12) The sender side of rdt3.0 simply ignores (that is, takes no action on) all received packetsthat are either in error or have the wrong value in the ack-num field of anacknowledgement packet. Suppose that in such circumstances, rdt3.0 were simply toretransmit the current data packet . Would the protocol still work? (hint: Consider whatwould happen if there were only bit errors; there are no packet losses but prematuretimeout can occur. Consider how many times the nth packet is sent, in the limit as napproaches infinity.)Answer:The protocol would still work, since a retransmission would be what would happen if the packet received with errors has actually been lost (and from the receiver standpoint, it never knows which of these events, if either, will occur). To get at the more subtle issue behind this question, one has to allow for premature timeouts to occur. In this case, if each extra copy of the packet is ACKed and each received extra ACK causes another extra copy of the current packet to be sent, the number of times packet n is sent will increase without bound as n approaches infinity.16. (P13) Consider a reliable data transfer protocol that uses only negative acknowledgements.Suppose the sender sends data only infrequently. Would a NAK-only protocol bepreferable to a protocol that uses ACKs? Why? Now suppose the sender has a lot ofdata to send and the end to end connection experiences few losses. In this second case ,would a NAK-only protocol be preferable to a protocol that uses ACKs? Why?Answer:In a NAK only protocol, the loss of packet x is only detected by the receiver when packetx+1 is received. That is, the receivers receives x-1 and then x+1, only when x+1 is received does the receiver realize that x was missed. If there is a long delay between the transmission of x and the transmission of x+1, then it will be a long time until x can be recovered, under a NAK only protocol.On the other hand, if data is being sent often, then recovery under a NAK-only scheme could happen quickly. Moreover, if errors are infrequent, then NAKs are only occasionally sent (when needed), and ACK are never sent – a significant reduction in feedback in the NAK-only case over the ACK-only case.17. (P14) Consider the cross-country example shown in Figure 3.17. How big would the windowsize have to be for the channel utilization to be greater than 80 percent?Answer:It takes 8 microseconds (or 0.008 milliseconds) to send a packet. in order for the sender to be busy 90 percent of the time, we must have util = 0.9 = (0.008n) / 30.016 or n approximately 3377 packets.18. (P15) Consider a scenario in which Host A wants to simultaneously send packets to Host Band C. A is connected to B and C via a broadcast channel—a packet sent by A is carriedby the channel to both B and C. Suppose that the broadcast channel connecting A, B,and C can independently lose and corrupt packets (and so, for example, a packet sentfrom A might be correctly received by B, but not by C). Design a stop-and-wait-likeerror-control protocol for reliable transferring packets from A to B and C, such that Awill not get new data from the upper layer until it knows that B and C have correctlyreceived the current packet. Give FSM descriptions of A and C. (Hint: The FSM for Bshould be essentially be same as for C.) Also, give a description of the packet format(s)used.Answer:In our solution, the sender will wait until it receives an ACK for a pair of messages (seqnum and seqnum+1) before moving on to the next pair of messages. Data packets have a data field and carry a two-bit sequence number. That is, the valid sequence numbers are 0, 1, 2, and 3. (Note: you should think about why a 1-bit sequence number space of 0, 1 only would not work in the solution below.) ACK messages carry the sequence number of the data packet they are acknowledging.The FSM for the sender and receiver are shown in Figure 2. Note that the sender state records whether (i) no ACKs have been received for the current pair, (ii) an ACK for seqnum (only) has been received, or an ACK for seqnum+1 (only) has been received. In this figure, we assume that theseqnum is initially 0, and that the sender has sent the first two data messages (to get things going).A timeline trace for the sender and receiver recovering from a lost packet is shown below:Sender Receivermake pair (0,1)send packet 0Packet 0 dropssend packet 1receive packet 1buffer packet 1send ACK 1receive ACK 1(timeout)resend packet 0receive packet 0deliver pair (0,1)send ACK 0receive ACK 019. (P16) Consider a scenario in which Host A and Host B want to send messages to Host C. HostsA and C are connected by a channel that can lose and corrupt (but not reorder)message.Hosts B and C are connected by another channel (independent of the channelconnecting A and C) with the same properties. The transport layer at Host C shouldalternate in delivering messages from A and B to the layer above (that is, it should firstdeliver the data from a packet from A, then the data from a packet from B, and so on).Design a stop-and-wait-like error-control protocol for reliable transferring packets fromA toB and C, with alternating delivery atC as described above. Give FSM descriptionsof A and C. (Hint: The FSM for B should be essentially be same as for A.) Also, give adescription of the packet format(s) used.Answer:This problem is a variation on the simple stop and wait protocol (rdt3.0). Because the channel may lose messages and because the sender may resend a message that one of the receivers has already received (either because of a premature timeout or because the other receiver has yet to receive the data correctly), sequence numbers are needed. As in rdt3.0, a 0-bit sequence number will suffice here.The sender and receiver FSM are shown in Figure 3. In this problem, the sender state indicates whether the sender has received an ACK from B (only), from C (only) or from neither C nor B. The receiver state indicates which sequence number the receiver is waiting for.20. (P17) In the generic SR protocol that we studied in Section 3.4.4, the sender transmits amessage as soon as it is available (if it is in the window) without waiting for anacknowledgment. Suppose now that we want an SR protocol that sends messages twoat a time. That is , the sender will send a pair of messages and will send the next pairof messages only when it knows that both messages in the first pair have been receivercorrectly.Suppose that the channel may lose messages but will not corrupt or reorder messages.Design an error-control protocol for the unidirectional reliable transfer of messages.Give an FSM description of the sender and receiver. Describe the format of the packetssent between sender and receiver, and vice versa. If you use any procedure calls otherthan those in Section 3.4(for example, udt_send(), start_timer(), rdt_rcv(), and soon) ,clearly state their actions. Give an example (a timeline trace of sender and receiver)showing how your protocol recovers from a lost packet.Answer:21. (P18) Consider the GBN protocol with a sender window size of 3 and a sequence numberrange of 1024. Suppose that at time t, the next in-order packet that the receiver isexpecting has a sequence number of k. Assume that the medium does not reordermessages. Answer the following questions:a. What are the possible sets of sequence number inside the sender’s window at timet? Justify your Answer.b .What are all possible values of the ACK field in all possible messages currentlypropagating back to the sender at time t? Justify your Answer.Answer:a.Here we have a window size of N=3. Suppose the receiver has received packet k-1, and hasACKed that and all other preceeding packets. If all of these ACK's have been received by sender, then sender's window is [k, k+N-1]. Suppose next that none of the ACKs have been received at the sender. In this second case, the sender's window contains k-1 and the N packets up to and including k-1. The sender's window is thus [k- N,k-1]. By these arguments, the senders window is of size 3 and begins somewhere in the range [k-N,k].b.If the receiver is waiting for packet k, then it has received (and ACKed) packet k-1 and the N-1packets before that. If none of those N ACKs have been yet received by the sender, then ACKmessages with values of [k-N,k-1] may still be propagating back. Because the sender has sent packets [k-N, k-1], it must be the case that the sender has already received an ACK for k-N-1.Once the receiver has sent an ACK for k-N-1 it will never send an ACK that is less that k-N-1.Thus the range of in-flight ACK values can range from k-N-1 to k-1.22. (P19) Answer true or false to the following questions and briefly justify your Answer.a. With the SR protocol, it is possible for the sender to receive an ACK for a packet thatfalls outside of its current window.b. With CBN, it is possible for the sender to receiver an ACK for a packet that fallsoutside of its current window.c. The alternating-bit protocol is the same as the SR protocol with a sender and receiverwindow size of 1.d. The alternating-bit protocol is the same as the GBN protocol with a sender andreceiver window size of 1.Answer:a.True. Suppose the sender has a window size of 3 and sends packets 1, 2, 3 at t0 . At t1 (t1 > t0)the receiver ACKS 1, 2, 3. At t2 (t2 > t1) the sender times out and resends 1, 2, 3. At t3 the receiver receives the duplicates and re-acknowledges 1, 2, 3. At t4 the sender receives the ACKs that the receiver sent at t1 and advances its window to 4, 5, 6. At t5 the sender receives the ACKs 1, 2, 3 the receiver sent at t2 . These ACKs are outside its window.b.True. By essentially the same scenario as in (a).c.True.d.True. Note that with a window size of 1, SR, GBN, and the alternating bit protocol arefunctionally equivalent. The window size of 1 precludes the possibility of out-of-order packets (within the window). A cumulative ACK is just an ordinary ACK in this situation, since it can only refer to the single packet within the window.23. (Q4) Why is it that voice and video traffic is often sent over TCP rather than UDP in today’sInternet. (Hint: The Answer we are looking for has nothing to do with TCP’s congestion-control mechanism. )Answer:Since most firewalls are configured to block UDP traffic, using TCP for video and voice traffic lets the traffic though the firewalls24. (Q5) Is it possible for an application to enjoy reliable data transfer even when the applicationruns over UDP? If so, how?Answer:Yes. The application developer can put reliable data transfer into the application layer protocol. This would require a significant amount of work and debugging, however.25. (Q6) Consider a TCP connection between Host A and Host B. Suppose that the TCP segmentstraveling form Host A to Host B have source port number x and destination portnumber y. What are the source and destination port number for the segments travelingform Host B to Host A?Answer:Source port number y and destination port number x.26. (P20) Suppose we have two network entities, A and B. B has a supply of data messages thatwill be sent to A according to the following conventions. When A gets a request fromthe layer above to get the next data (D) message from B, A must send a request (R)message to B on the A-to-B channel. Only when B receives an R message can it send adata (D) message back to A on the B-to-A channel. A should deliver exactly one copy ofeach D message to the layer above. R message can be lost (but not corrupted) in the A-to-B channel; D messages, once sent, are always delivered correctly. The delay alongboth channels is unknown and variable.Design(give an FSM description of) a protocol that incorporates the appropriatemechanisms to compensate for the loss-prone A-to-B channel and implementsmessage passing to the layer above at entity A, as discussed above. Use only thosemechanisms that are absolutely necessary.Answer:Because the A-to-B channel can lose request messages, A will need to timeout and retransmit its request messages (to be able to recover from loss). Because the channel delays are variable and unknown, it is possible that A will send duplicate requests (i.e., resend a request message that has already been received by B). To be able to detect duplicate request messages, the protocol will use sequence numbers. A 1-bit sequence number will suffice for a stop-and-wait type of request/response protocol.A (the requestor) has 4 states:• “Wait for Request 0 from above.” Here the requestor is waiting for a call from above to request a unit of data. When it receives a request from above, it sends a request message, R0, to B, starts a timer and make s a transition to the “Wait for D0” state. When in the “Wait for Request 0 from above” state, A ign ores anything it receives from B.• “Wait for D0”. Here the requestor is waiting for a D0 data message from B. A timer is always running in this state. If the timer expires, A sends another R0 message, restarts the timer and remains in this state. If a D0 message is received from B, A stops the time and transits to the “Wait for Request 1 from above” state. If A receives a D1 data message while in this state, it is ignored.• “Wait for Request 1 from above.” Here the requestor is again waiting for a call from above to request a unit of data. When it receives a request from above, it sends a request message, R1, to B, starts a timer and makes a transition to the “Wait for D1” state. When in the “Wait for Request 1 from above” state, A ignores anything it receives from B.• “Wait for D1”. Here the requestor is waiting for a D1 data message from B. A timer is always running in this state. If the timer expires, A sends another R1 message, restarts the timer and remains in this state. If a D1 message is received from B, A stops the timer and transits to the “Wait for Request 0 from above” state. If A receives a D0 data message while in this state, it is ignored.The data supplier (B) has only two states:。
大学物理课后习题详解(第三章)中国石油大学
3-1 以速度0v 前进的炮车,向后发射一炮弹,已知炮车的仰角为θ,炮弹和炮车的质习题3-1图量分别为m 和M ,炮弹相对炮车的出口速率为v ,如图所示。
求炮车的反冲速率是多大?[解] 以大地为参照系,取炮弹与炮弹组成的系统为研究对象,系统水平方向的动量守恒。
由图可知炮弹相对于地面的速度的水平分量为v v '-θcos ,根据动量守恒定律()()v M v v m v m M '-'-=+-θcos 0所以 ()mM mv v m M v +++='θcos 0此即为炮车的反冲速率。
3-2 质量为M 的平板车,在水平地面上无摩擦地运动。
若有N 个人,质量均为m ,站在车上。
开始时车以速度0v 向右运动,后来人相对于车以速度u 向左快跑。
试证明:(1)N 个人一同跳离车以后,车速为NmM Nmuv v ++=0(2)车上N 个人均以相对于车的速度u 向左相继跳离,N 个人均跳离后,车速为()mM mum N M mu Nm M mu v v +++-++++=' 10[证明] (1) 取车和人组成的系统为研究对象,以地面为参照系,系统的水平方向的动量守恒。
人相对于地面的速度为u v -,则()()Mv u v Nm v Nm M +-=+0所以 NmM Nmuv v ++=0(2) 设第1-x 个人跳离车后,车的速度为1-x v ,第x 个人跳离车后,车的速度为x v ,根据动量守恒定律得()[]()()[]x x 1x 1v m x N M u v m v m x N M -++-=+-+-所以 ()Mm x N muv v ++-+=-11x x此即车速的递推关系式,取N x ,,2,1 =得Mm muv v ++=-1N NMm muv v ++=--22N 1N……………………()M m N muv v +-+=112 MNm muv v ++=01将上面所有的式子相加得()Mm muM m mu M m N mu M Nm mu v v ++++++-+++=210N 此即为第N 个人跳离车后的速度,即()mM mum N M mu Nm M mu v v +++-++++=' 103-3 质量为m =0.002kg 的弹丸,其出口速率为300m ,设弹丸在枪筒中前进所受到的合力800400x F -=。
数字电子技术第三章习题课
辽宁工业大学
电子与信息工程学院 电子信息工程教研室
第3章、门电路
一、本章内容: 逻辑门电路是各种数字电路及数字系统的基本逻辑单元。本章首先介
绍了半导体二极管和三极管的开关特性,同时介绍了TTL和CMOS两类集成 门电路的特性,即它们的逻辑功能和外部电气特性(包括电压传输特性、 输入特性、输出特性和动态特性等)。为便于合理选择和正确使用数字 集成器件,必须熟悉它们的主要参数,逻辑门使用中的接口问题以及其 他一些实际问题。
写出真值表。
DM
1
表题2.18
△ △ △
S1 S0
≥1
DN
EN 1
EN
输入
输
S1
S0
Y
0
0
0
1
1
DP
1
1
0
EN
&
图3.6
1
1
, 解: 在输入S1、S0各种取值下的输出Y见下表。
输入
S1
S0
输出 Y
0
0
Y DN
0
1
Y DP
信息工程学院 电子教研室
1
9
Y DM
第3章、门电路
解:Y1为低电平;Y2为高电平;Y3为高电平;Y4为低电平;Y5为低电平;Y6 为高阻态;Y7为高电平;Y8为低电平。
电子与信息工程学院
19
电子教研室
第3章、门电路
题3.15 说明图3.15中各门电路的输出时高电平还是低电平。已知他们 都是74HC系列的CMOS电路。
解:Y1为高电平;Y2为高电平;Y3为低电平;Y4为低电平。
解 (a) Y1 ABCDE (c) Y3 ABC DEF
第三章微机原理习题课
.第三章习题课一、选择题1、在汇编语言程序的开发过程中使用宏功能的顺序是()。
A、宏定义,宏调用B、宏定义,宏展开C、宏定义,宏调用,宏展开D、宏定义,宏展开,宏调用2、汇编语言源程序中,每个语句由四项组成,如语句要完成一定功能,那么该语句中不可省略的项是()。
A、名字项B、操作项C、操作数项D、注释项3、下列叙述正确的是()A.对两个无符号数进行比较采用CMP指令,对两个有符号数比较用CMPS指令B.对两个无符号数进行比较采用CMPS指令,对两个有符号数比较用CMP指令C.对无符号数条件转移采用JAE/JNB指令,对有符号数条件转移用JGE/JNL指令D.对无符号数条件转移采用JGE/JNL指令,对有符号数条件转移用JAE/JNB指令4、编写分支程序,在进行条件判断前,可用指令构成条件,其中不能形成条件的指令有().A、CMPB、SUBC、ANDD、MOV5、测试BL寄存器容是否与数据4FH相等,若相等则转NEXT处执行,可实现的方法是()。
A TEST BL,4FHJZ NEXTB XOR BL,4FHJZ NEXTC AND BL,4FHJZ NEXTD OR BL,4FHJZ NEXT6、检查BUF的容是否为正偶数,如是正偶数,则令AL=0。
下面程序段正确的是( )。
A、MOV AL,BUF JS K1SHR AL,1JNC K1MOV AL,0K1:……B、MOV AL,BUF AND AL,11 JNZ K2MOV AL,0K2:……C 、MOV AL ,BUF TEST AL ,81H JNZ K3 MOV AL ,0 K3:……7、下列描述中,执行循环的次数最多的情况是()。
A .MOV CX ,0B .MOV CX ,1 LOP :LOOP LOP LOP :LOOP LOPC .MOV CX ,0FFFFHD .MOV CX ,256 LOP :LOOP LOP LOP :LOOP LOP8、在下列指令中,指令的执行会影响条件码中的CF 位。
高等数学(同济版)第三章-习题课
m f (0), f (1), f (2) M
m
f (0) f (1) f (2) 3
M
由介值定理, 至少存在一点 c [0, 2] , 使
由罗f分(c尔析) 定: 所想理f f(给到3知(c)条找),必1件一,存f且可点(0在)写fc(f,为x3(使1))在(cff[(,f(c032(,)))c3)]f上3(11()0连f,(3f0续())2,),使f在3(11)(f,c(,ff3((2))3)内)0可1. 导,
一、主要内容
Cauchy 中值定理
F(x) x
洛必达法则
型
f g 1 g1 f 1 g1 f
0型 0 型
00 ,1 , 0 型
令y f g 取对数
0型
f g f 1g
Lagrange 中值定理
f (a) f (b)
Rolle 定理
n0
Taylor 中值定理
常用的 泰勒公式
导数的应用
单调性,极值与最值, 凹凸性,拐点,函数 图形的描绘; 曲率;求根方法.
( x)
1 ln(1
x)
1
1 x
2
0
(x 0)
故 x 0时, (x)单调增加 , 从而 (x) (0) 0
即
ln(1 x) arctan x (x 0)
1 x
思考: 证明 1 x ln(1 x) (0 x 1) 时, 如何设辅助 1 x arcsin x
函数更好 ?
提示: (x) (1 x) ln(1 x) 1 x2 arcsin x
y
2 x( x2 (x2
3) 1)2
(
x
1 1)3
(x
1 1)3
第3章习题课 正弦交流电路
3.5 将以下相量转化为正弦量 (1) U 50 j50V (2) Im 30 j40A (3) Um 100 2e j30V (4) I 1 30A
解:(1) u(t) 50 2 2 sin(t 45) 100sin(t 45)V (2) i( t ) 50 sin(t 126.9 )A (3) u(t) 100 2 sin(t 30)V (4) i(t ) 2 sin(t 30)A
3.6 相量图如图所示,已知频率ƒ=50Hz。写出它们对
应的相量式和瞬时值式。
100V
解:
I 100 i( t ) 10 2 sin 314t A
U1 10090 u1( t ) 100 2 sin( 314t 90 )V U2 80 60 u2 ( t ) 80 2 sin( 314t 60 )V Um 3100 u( t ) 310 sin 314tV I1m 10 45 i1( t ) 10 sin( 314t 45 )A I2m 1260 i2 ( t ) 12 sin( 314t 60 )A
(1)求电压uR、uL、 uC和电流i。 (2)求电路的有功功率P、无功功率Q和视在功率S。 (3)画出相量图。
解:
i 10 2 sin(100t)A uR 100 2 sin(100t)V uL 100 2 sin(100t 90)V uC 100 2 sin(100t 90)V P 1000W,Q 0var,S 1000VA
(b) Z2、Z3不能正常工作,Z2上电压仅为126.7V, 低于额定电压,而Z3上电压253.3V,高于额定电压。
解: (1) u1超前于u2 45 。
(2) 60,u 滞后于 i 60 。
(3)由于u 、 i 不同频,故无法比较相位。
习题课 第03章 糖代谢习题
E 48.丙酮酸脱氢酶系的辅助因子没有下列某一种成分 A、FAD; B、TPP; C、NAD+; D、CoA; E、生物素
49.三羧酸循环中不提供氢的步骤是
A、柠檬酸→异柠檬酸; B、异柠檬酸→α-酮戊二酸
A
D、脂肪酸合成; E、胆固醇合成
27.在下列酶促反应中,哪个酶催化的反应是可逆的
A、己糖激酶; B、葡萄糖激酶 ; C、磷酸甘油酸激酶; D、6-磷酸果糖激酶-1;
C
E、丙酮酸激酶
29.下列哪个代谢过程不能直接补充血糖? A、肝糖原分解; B、肌糖原分解; C、食物糖类的消化吸收; D、糖异生作用; E、肾小球的重吸收作用
酸。
(√)
14.胰岛素能促进糖的异生作用。 (×)抑制,胰高血糖素和肾上腺素促进
15.乙醛酸循环可使脂肪酸氧化的产物转化为 (√) 糖。
16.UDP葡萄糖是糖原合成时葡萄糖的直接 供体。
(√)
17.TPP是丙酮酸脱氢酶复合体中转乙酰化酶的辅酶。
(×)硫辛酸
18.丙酮酸氧化脱羧的酶系存在于细胞液中。
13.丙酮酸脱氢酶复合体中转乙酰化酶的辅酶是:
A、TPP; B、硫辛酸; C、CoASH; D、FAD; E、NAD+ B
15.糖有氧氧化的最终产物是:
A、CO2+H2O+ATP; B、乳酸; C、丙酮酸; D、乙酰CoA; E、柠檬酸
A
16.丙酮酸不参与下列哪种代谢过程
A、转变为丙氨酸; B、经异构酶催化生成丙酮; C、进入线粒体氧化供能; D、还原成乳酸;
A、己糖激酶; B、磷酸己糖异构酶; C、醛缩酶;
D、3-磷酸甘油醛脱氢酶; E、乳酸脱氢酶
A
35.1分于葡萄糖无氧酵解时净生成几分于ATP
概率论第三章习题及答案
则称
p i j P X x i , Y y j i , j 1 , 2 ,
为二维离散 X , Y 型 的随 (机 联变 合量
2021/7/1
14
第三章 习题课
二维离散型随机变量的联合分布律
X,Y的联合分布下 律表 也表 可示 以
布的关系,了解条件分布。 3 掌握二维均匀分布和二维正态分布。 4 要理解随机变量的独立性。 5 要会求二维随机变量的和及多维随机变返回主目3 录
第三章 习题课
1 二维随机变量的定义 设 E 是一个随机试验,它的样本空间是 S={e}, 设 X=X(e) 和 Y=Y(e) 是定义在 S 上的随机变量。 由它们构成的一个向量 (X, Y) ,叫做二维随机 向量,或二维随机变量。
2021/7/1
返回主目17 录
4) F ( x 2 , y 2 ) F ( x 2 , y 1 ) F ( x 1 , y 1 ) F ( x 1 , y 2 ) 0 .
2021/7/1
y y2
(x1 , y2)
(X, Y )
y1 (x1 , y1)
o x1
(x2 , y2)
(x2 , y1)
10
x2
x
第三章 习题课
说明
Y X
y1
y2
…
yj
…
x1
p11
p12
…
p1 j
…
x2
p 21
p 22
p2 j
…
xi
pi1
2021/7/1
…
返回主目15 录
第三章 习题课
二维离散型随机变量联合分布律的性质
大学物理上册一二章习题公开课一等奖优质课大赛微课获奖课件
k
xB 0.6R
vC2 0.8gR N 0.8mg
第24页
第三章 习题课
5. 如图所表示,质量为m木块,从高为h,倾角为q 光滑斜 面上由静止开始下滑,滑入装着砂子木箱中,砂子和木箱 总质量为M,木箱与一端固定, 劲度系数为k水平轻弹簧 连接,最初弹簧为原长,木块落入后,弹簧最大压缩量为l,
sinq 1 0.64 0.6
2mg sinq cosq 0.6mg sinq mat
at 0.6g 5.88 m/s2 N N F cosq mg cos 2q 0.2mg
第23页
第三章 习题课
mg sin 2q F sinq mat
N F cosq mg cos 2q man
一.选择题
第三章 习题课
1. 对于一个物体系来说,在下列条件中,哪种情 况下系统机械能守恒?
(A) 合外力为0; (B) 合外力不作功; (C) 外力和非保守内力都不作功; (D) 外力和保守内力都不作功。
2.两个质量相等小球由一轻弹簧相连接,再用一细绳
悬挂于天花板上,处于静止状态,如图所表示.将绳
第31页
试求木箱与水平面间摩擦系数.
解: m落入木箱前瞬时速度 v0 2gh
m
h
q
M
k
以M、m为系统,m落入木箱时沿水平方 l 向m与M间冲力(内力)远不小于地面 与木箱间摩擦力(外力),在水平方向 动量守恒 mv0 cosq (M m)v
第三章 习题课
例3. 已知调和函数 u ( x, y ) = x − y + xy ,求共轭调
2 2
和函数 v ( x, y )及解析函数 f ( z ) = u ( x, y ) + iv ( x, y ) 解
u ( x, y ) = x − y + xy ⇒ u x = 2 x + y, u y = −2 y + x
二. 习题解答 例1
f ( z ) 在区域D内解析, 在 D = D + ∂D
上连续, C = ∂D, z0 ∈ D 则
∫
C
f ( z) dz = 0?( F ) z − z0
∫
C
f ( z) dz = f ( z0 ) ?( F ) z − z0
例2. (1) 设 C : z = 2 , f ( z ) 在 I ( C ) 上解析,求
f ( z) 1 1 1 dz C1 : z − 1 = , C2 : z − = 或者 ∫C 1 6 2 6 ( z − 1) z − 2 f ( z) f ( z) 1 z− ( z − 1) dz 2 = ∫ dz + ∫ C1 C2 1 ( z − 1) z− 2 1 f f (1) 2 = 4π i f 1 − f 1 = 2π i + 2π i ( ) 1 1 2 − 1 1− 2 2
2ζ 2 − ζ + 1 (2). g ( z ) = ∫ dζ ζ =2 ζ −z
求 g (1), g ( z0 ) z0 > 2 解
2ζ 2 − ζ + 1 g (1) = ∫ dζ ζ =2 ζ −1 = 2π i 2ζ 2 − ζ + 1 = 4π i
数字电路 第3章习题课
题3-15
A B C D
F 0 0 1 1 1 1 0 0 0 0 × × × × × ×
× ×
题3-15
解: F BC D0 0
F
四选一MUX D1 1 D2 1 D3 0 E
题3-16
用74LS138和与非门实现下列逻辑函数。
Y1 ABC A( B C )
+5V
0 0 1 F3 F 5 F 61 F 7 04 F 0 0 1 0 0 1 74138 1 1 1 0 A0 1 1 12 A1 A 0 0 0 0X0 0 X1 0 X2
题3-13
试用 74138 和 74151 构成两个四位二进制数相同 比较器。其功能为两个二进制数相等时输出为 1, 否则为 0。 解:74138 和 74151 地址端均为三变量输入,要 实现四位二进制数相同比较器,必须分别用两个芯 片级联扩展输入端,并分别将待比较的两个四位二 进制数输入到扩展后的输入端,就可得到两个四位 二进制数相同时,输出为 1 的功能。逻辑图如图 3-36 所示。
1 0 B F= A B+ A B 1 1 B 0 0 0 0 1 B F= AB
G1 G0 A
A2 F F A1 MUX A0 D D D D D D D 0 1 2 3 4 5 6 D7 1 1
B
1
1 1
1 0 B F= A B+A 1 1 1 = A +B
题3-5
列出图 3-58 所示电路的真值表。图中芯片为 8421 码二-十进制译码器,输出低电平有效。
0 1
D
题3-3
解:
F F0 F4 F5 F6 F8 F10 F12 F15 F0 F4 F5 F6 F8 F10 F12 F15 (0,4,5,6,8,10,12,15)
第三章 分子的对称性习题课
二、填空题____ 1、有一个 AB3分子,实验测得其偶极矩为零且有一个三重轴,则此分子所属 点群是________。 2、 NF3分子属于_____________点群。该分子是极性分子, 其偶极矩向量位 于__________上。 3、 (1)对-二氟苯 (2)邻-二氟苯 (3)间-二氟苯,有相同的点群的是_______。 4、 丙二烯分子所属点群为_______。 5、既有偶极矩,又有旋光性的分子必属于_________点群。
13 、氯乙烯 (CH2CHCl)中,大π键是_________, 该分子属于_______点群。
三、问答题 1、 指出下列分子所属点群:
(1) H2O2(两个OH不共面) 式)
(3) CH3CHClBr (5) BF5 (四方锥) (7) ClCH=CHCl(反式) (9) 三乙二胺合钴离子
(2) H3C—CCl3(既非交叉,又非重迭
确定分子点群的流程简图
分子
线形分子: D ∞ h C ∞ v 根据有无对称中心判断
有多条高阶轴分子(正四面体、正八面体…)
Td , O h ,
只有镜面或对称中心, 或无对称性的分子:
C1,C i,Cs
只有S2n(n为正整数)分子: S 4 , S 6 , S 8 , . . .
Cn轴(但不是S2n 的简单结果)
______________。
4、(丙2)二和烯(分3子)所属点群为_____。
5、既有偶极矩,又有旋光性的D分2d 子必属于____点群。
6、偶极矩μ=0,而可能有旋光性的分子所属C的n 点群为____;偶极矩μ≠0,而一定
没有旋光性的分子所属的点群为_____。
Dn
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
3
1 0 (1 ) 2 3 (1 ) log 2 (1 ) log 2 (1 ) log (1 ) log (1 ) 3 2 2 2 1 0 解方程得: 2= 3 (1 ) log 2 (1 ) log 2
X 1 0 Y 0
1-ε
1 1
ε ε
2
1-ε
2
2013-7-14
14
习题5
解答:图中信道的信道矩阵如下
0 1 P 0 1 0 此信道为一般信道。
(1)求 j
3
第三章 信道容量
0 1
p( y
j 1
j
/ xi ) j p ( y j / xi ) log 2 p ( y j / xi ), i 1, 2, 3
Pa 1 6
1 3 1 6 1 3 1 3 1 6
第三章 信道容量
1 2 1 1 6 , Pb 6 1 3 1 3
1 3 1 2 1 6
1 3 1 2
1 6
均满足对称性,所以这两个信道是对称离散信道。由对 称离散信道的信道容量公式得:
C1 log 2 4 H ( 1 , 3 C 2 log 2 3 H ( 1 , 2
1
1
x2
1/4
y2
2013-7-14
4
习题1 (1) I ( x ) log
1
2
p ( x1 ) log 2 0.6 0.737 bit
第三章 信道容量
I ( x2 ) log 2 p ( x2 ) log 2 0.4 1.32it 可见,概率越小的事件含有的自信息越大。
i 1 j 1 2 2
噪声熵: H (Y / X ) p ( xi ) p ( y j / xi ) log 2 p ( y j / xi ) 0.7145bit / symbol
i 1 j 1 2 2
(5)接收到Y后获得的平均互信息I(X;Y) I(X;Y)=H(X)-H(X/Y)=H(Y)-H(Y/X) 0.0075bit/symbol
2013-7-14 15
习题5
(2)求C C log 2 2
j
第三章 信道容量
j
log 2 [1 2(1 )1 ] (3)求 p ( y j ) 1 p ( y1 ) 2 1 C 1 2(1 )1 (1 )1 p ( y2 ) 1 2(1 )1 p ( y3 ) p ( y 2 ) (4)求 p ( xi ) 根据 p ( y j )
2013-7-14
2
求信道容量的方法
第三章 信道容量
当信道特性 p(yj /xi) 固定后,I(X;Y) 随信源概率分布 p(xi) 的变化而变化。
调整 p(xi),在接收端就能获得不同的信息量。由平均互 信息的性质已知,I(X;Y) 是 p(xi) 的上凸函数,因此总能 找到一种概率分布 p(xi)(即某一种信源),使信道所能 传送的信息率为最大。 C 和 Ct 都是求平均互信息 I(X;Y) 的条件极大值问题,当 输入信源概率分布 p(xi) 调整好以后, C 和 Ct 已与 p(xi) 无关,而仅仅是信道转移概率的函数,只与信道统计特性 有关;
0 0.98 0.02 0
0.02 1 0.98 1
2013-7-14
9
习题3
第三章 信道容量
解答:消息是一个二元序列,且为等概率分布,即 P(0)=P(1)=1/2,故信源的熵为H(X)=1(bit/symbol)。 则该消息序列含有的信息量=14000(bit/symbol)。 下面计算该二元对称信道能传输的最大的信息传输 速率: 信道传递矩阵为: 0.98 0.02 P 0.02 0.98 信道容量(最大信息传输率)为: C=1-H(P)=1-H(0.98)≈0.8586bit/symbol
解答:
(2) p ( y1 / x1 ) 5 / 6, p ( y 2 / x1 ) 1/ 6, p ( y1 / x2 ) 3 / 4, p ( y 2 / x2 ) 1/ 4
互信息可以为正值也可以为 由互信息公式:
负值,负值表明由于噪声的 p ( xi / y j ) p ( y j / xi ) I ( xi 存在,接收到一个消息后, ; y j ) log 2 log 2 p ( xi ) p( y j ) 对另一个消息是否出现的不 计 算互信息一般取第二个等式,必须先计算出 p ( y j ) 确定性反而增加了。 5 3
第三章 信道容量
解答:(1)已知二元对称信道的传递矩阵和输入信源的概率分布, p(y=0)=7/12;p(y=1)=5/12;p(x=0/y=0)=6/7;p(x=1/y=0)=1/7 p(x=0/y=1)=3/5;p(x=1/y=1)=2/5 进一步可算得:H(X) 0.811bit/symbol H(Y/X) 0.918bit/symbol;H(X/Y) 0.749bit/symbol 因此,I(X;Y)=H(X)-H(X/Y) 0.062bit/symbol (2)此信道为二元对称信道,所以信道容量为 C 1 H ( p ) 1 H ( 2 ) 0.082 bit/symbol 3 当输入符号为等概率分布时信道的信息传输率才能达到该值。
可得: p ( x1 / y1 ) 5 / 8, p ( x1 / y 2 ) 1/ 2, p ( x2 / y1 ) 3 / 8, p ( x2 / y 2 ) 1/ 2 信道疑义度: H ( X / Y ) p ( xi ) p ( y j / xi ) log 2 p ( xi / y j ) 0.9635bit / symbol
2013-7-14 6
习题2
2.设二元对称信道的传递概率为
第三章 信道容量
2 3 1 3
1 3
2 3
①若P(0)=3/4,P(1)=1/4,求H(X),H(X/Y),H(Y/X)和I(X;Y)。 ②求该信道的信道容量及达到信道容量时的输入概率分 布。
2013-7-14
7
习题2
可求出输出Y的概率分布和后验概率
2013-7-14
25 24 15 16
0.059bit ; I ( x1 ; y 2 ) log 2
5 6
0.263bit 5 4 0.322bit
5
0.093bit ; I ( x2 ; y 2 ) log 2
习题1 (3) H ( X ) 0.6 log 0.6 0.4 log 0.4 0.971bit / symbol
2 2
第三章 信道容量
H (Y ) 0.8 log 2 0.8 0.2 log 2 0.2 0.722 bit / symbol
解答:
(4) p ( y1 / x1 ) 5 / 6, p ( y 2 / x1 ) 1/ 6, p ( y1 / x2 ) 3 / 4, p ( y 2 / x2 ) 1/ 4 由公式: p ( xi / y j ) p ( xi ) p ( y j / x i ) p( y j )
2013-7-14 8
习题3
第三章 信道容量
3.有一个二元对称信道,其信道矩阵如下图所示。设该 信道以1500个二元符号/秒的速度传输输入符号。现有 一消息序列共有14000个二元符号,并设在这消息中 P(0)=P(1)=1/2。问从信息传输的角度来考虑,10秒钟 内能否将这消息序列无失真地传送完?
第三章 信道容量
子曰:“不愤不启,不 悱不发,举一隅不以三隅 反,则不复也”
-孔子
2013-7-14
1
第三章总结
第三章 信道容量
信道容量 C:在信道中最大的信息传输速率,单位 是比特/信道符号。
单位时间的信道容量 Ct:若信道平均传输一个符号 需要 t 秒钟,则单位时间的信道容量为
Ct 实际是信道的最大信息传输速率。
2013-7-14
16
习题5
第三章 信道容量
当 =0时,此信道为一一对应信道,即 C log 2 3, p ( x1 ) p ( x2 ) p ( x3 ) 1 / 3 当 =1 / 2时 C 1, p ( x1 ) 1 / 2, p ( x2 ) p ( x3 ) 1 / 4
p ( y1 ) p ( xi ) p ( y j / xi ) 0.6 6 0.4 4 0.8
X
p ( y 2 ) 0.6 1 0.4 1 0.2; 满足归一性即 p ( y1 ) +p ( y 2 ) 1 6 4 可算得: I ( x1 ; y1 ) log 2 I ( x2 ; y1 ) log 2
2013-7-14 11
习题4
第三章 信道容量
4.求下图中信道的信道容量及其最佳的输入概率分 布。
1/3 1/6 1/3 1/6 1/6 1/6 1/2 1/6 1/3 1/2 1/3
1/3 1/6 1/3
1/3 1/6 1/2
(a)
2013-7-14
(b)
12
习题4
解答:图中两个信道的信道矩阵分别为
2013-7-14
10
习题3
第三章 信道容量
得最大信息传输速率为: Rt ≈1500符号/秒× 0.8586比特/符号 ≈1287.9比特/秒 ≈1.288×103比特/秒 此信道10秒钟内能无失真传输得最大信息量=10× Rt ≈ 1.288×104比特 可见,此信道10秒内能无失真传输得最大信息量小 于这消息序列所含有的信息量,故从信息传输的角度 来考虑,不可能在10秒钟内将这消息无失真的传送完。