Solved

IEEE 754 standard

Posted on 2014-04-19
2
246 Views
Last Modified: 2014-04-20
How would you use the IEEE 754 standard to represent a floating point number if you were given the bit pattern representation of it?
0
Comment
Question by:pcomb
2 Comments
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 40010902
The IEEE 754 standard defines the bit patterns to use for floating point numbers along with methods and other details.  It is used in math coprocessors and in mathematical routines in almost all programming languages.  So I'm not sure what your question is about.  What 'bit pattern representation' are you talking about?
0
 
LVL 51

Accepted Solution

by:
Joe Winograd, EE MVE earned 500 total points
ID: 40010923
The IEEE 754 representation of a number contains three components:

(1) sign bit: if the sign bit is 0, the number is positive; if the sign bit is 1, the number is negative.

(2) significand: a number greater than or equal to 1 and less than 2, often referred to as "1 plus a fraction" (an older term for this component is mantissa)

(3) exponent: a power of 2.

Here's an excellent description of IEEE 754 format, with examples of converting to and from it:
http://www.oxfordmathcenter.com/drupal7/node/43

If you want to learn more about it, take a look at David Goldberg's comprehensive article, What Every Computer Scientist Should Know about Floating-Point Arithmetic.

Also, there was an interesting thread here at EE a few years ago that you may find helpful:
http://www.experts-exchange.com/Programming/Algorithms/Q_25116964.html

Regards, Joe
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Upper back Pain: My back hurt for months. Upper back, mostly my neck, spine and across my shoulder blades. I was getting headaches too, that felt like they were caused by tension in my shoulders, but now I feel fine! I'm sharing this hoping someone…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now