Design algorithm that computes how many steps it will take

Assignment Help Data Structure & Algorithms
Reference no: EM131232199

Algorithm

Problem 2.17

There are n bacteria and 1 virus in a Petri dish. Within the first minute, the virus kills one bacterium and produces another copy of itself, and all of the remaining bacteria reproduce, making 2 viruses and 2 · (n - 1) bacteria. In the second minute, each of the viruses kills a bacterium and produces a new copy of itself (resulting in 4 viruses and 2(2(n - 1) - 2) = 4n - 8 bacteria; again, the remaining bacteria reproduce. This process continues every minute. Will the viruses eventually kill all the bacteria? If so, design an algorithm that computes how many steps it will take. How does the running time of your algorithm depend on n?

Problem 4.13

Given a long text string T, one shorter pattern string s, and an integer k, find the first occurrence in T of a string (if any) s such that dH(s, s ) ≤ k. What is the complexity of your algorithm?

Problem 4.14

Given a long text string T, one shorter pattern string s, and an integer k, find the first occurrence in T of a string (if any) s such that dH(s, s ) ≤ k. What is the complexity of your algorithm?.

All these qustion are from the book (Introduction to Bioinformatics Algorithms. Neil C. Jones and Pavel A. Pevzner, The MIT Press (ISBN: 0-262-10106-8)).

Reference no: EM131232199

Questions Cloud

Why ethics and confidentiality play an integral role : Differences between community setting and correctional setting case management, How the process will need to be altered for various special populations and Potential clients in need of case management at both settings.
Why has there been no movement to initiate such a proposal : An ongoing debate about the Superfund program is the determination of the optimal abatement level, characterized as the "how clean is clean" problem. Choose one of the risk management strategies, and propose how it might be used to resolve this is..
Why does riordan need a strategic plan : Address the following questions in your strategic plan: Why does Riordan need a strategic plan? What role should ethical and social responsibility considerations have in Riordan's strategic management plan
Determine the bit line voltages v1 and v2 : Determine the bit line voltages v1 and v2 after the cells are addressed for the case when (a) a logic 1 is stored and (b) a logic 0 is stored.
Design algorithm that computes how many steps it will take : Will the viruses eventually kill all the bacteria? If so, design an algorithm that computes how many steps it will take. How does the running time of your algorithm depend on n?
List the factors for rating the product quality : Create a rating tool for the product or service. List the factors for rating the product's quality and then rate your product or service from 1 to 10 (1 as the lowest, 10 the highest) for each factor
Create and describe a comprehensive security policy : Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
Advantages and disadvantages of the swot analysis : Explain the purpose of a SWOT analysis. What are the alternatives? Discuss the advantages and disadvantages of the SWOT analysis
Discuss the likely impact on the health care industry : Analyze the two working models for understanding different health care systems and determine which model would be most useful to you in your current (or future) position in the health care industry. Provide specific examples to support your respon..

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Write an algorithm using pseudo code

Write an algorithm, using pseudo code, "Consensus algorithm": A group of ten people need to decide which one flavor of ice cream they will all order, out of three options.

  Write program that uses the radix sort to sort random digits

Write a program that uses the radix sort to sort 1000 random digits. Print the data before and after the sort. Each sort bucket should be a linked list. At the end of the sort, the data should be in the original array.

  Creating a database design in visio-business rules

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors te..

  What is the running time of quicksort

What is the running time of QUICKSORT when all elements of array A have the same value - Why do we analyze the expected running time of a randomized algorithm and not its worst-case running time?

  Draw five-vertex connected graph g that has no cut-vertices

Draw a 5-vertex connected graph G that has no cut-vertices, and then verify that G satisfies each of the following properties. Prove or disprove: If a simple graph G has no cut-edge, then every vertex pf G has even degree?

  Part 1 mining information from sales data is a common task

part 1 mining information from sales data is a common task in both traditional and online stores. past sales

  What modifications should be made to the echo algorithm

What modifications should be made to the echo algorithm? What modifications should be made to Finn's algorithm?

  Algorithm to keep track of sufficient information

Your algorithm must keep track of sufficient information so that, for any computer Cb it is possible to retrieve in O(n) time a sequence of communications by which Cb could have become infected.

  Survey of fault tolerance policy for load balancing scheme o

This paper investigates about fault-tolerance in load balancing schemes in distributed environment. There are some more parameters influencing QOS but our main focus is on fault tolerance and load balancing.

  What step in the proof fails if messages can be duplicated

Show that the relationship in Lemma 6. 19 also holds if mes­ sages can get lost in the channel pq, but not if messages can be duplicated. What step in the proof fails if messages can be duplicated?

  Create a map and store the names with associated student id

Display the values from the priority queue using the peek() method. Describe your observation of change to the list of names in the report file.

  Convert the displayed flowchart into pseudocode

Convert the displayed flowchart into pseudocode by filling in the blanks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd