Prove that there can be at most 13 distinct common entries

Assignment Help Data Structure & Algorithms
Reference no: EM13944418

This sununer, after having passed CS341 with a wonderfully high mark, you decide to take on another test of endurance by walking along El Camino de Santiago'. This trail traditionally starts in St Jean Pied de Port and finishes in Santiago de Compostela. The trail is about 780 km long and travels across most of Northern Spain. Suppose you decide to hike at most dim each day. At the end of each day, you will rest in one of the several albergues2 that can be found in the many villages along the Camino. Being a diligent CS student, you understand the importance of collecting data and so, before the journey, you will have generated a list of n albergues. Each entry in the list is simply the name of the I' albergue and its distance from the starting point: x[i] measured in km. Describe a greedy algorithm that will give you a list of m albergues specifying where you will rest if you wish to do the walk in the minimum number of days. Provide an inductive proof that your algoritlun works.
To make answers uniform, everyone should assume that the walk starts from the first albergue at St Jean Pied de Port. So x[1] = 0 and the output list of m albergues should begin with this albergue. You may also assume that the maximum distance between two consecutive albergues is less than d.

The year is 2029. Ex-Blade Runner Rick Deckard has been sent by the Tyrell Corporation to the planet Tyrell-III to identify conunon models of replicants (https://en.wikipedia.orgiwiki/Replicant).


Tyrell-III has n replicants and each has a particular model specification. There are many models. Unfortunately, there was an insurgency on the planet and some of the replicants destroyed a critical database that held replicant data. Because of this, the

Tyrell Corporation does not know the model specifications for the replicants but it does know that there are 13 "conunon" models. Decker is told that a model is said to be common if there are at least n/13 instances of that model.
Deckard has been given a very sophisticated electronic device that, when attached to two replicants, will tell Deckard whether the two replicants have the same model specification. This operation is called a query. Unfortunately (again), replicants tend to be somewhat uncooperative and Deckard can only carry out a query at substantial risk to the continuation of his life. Consequently, the Tyrell Corporation wants him to identify all cominon models using the minimum number of queries.
We model the problem as follows:

We have an array R[l..n] of n entries (each entry being a particular model specification). The only possible operation allowed on R is a query of the form: Check(R[i],R[j]) that returns True if R[i] and R[i] are equal (the corresponding replicants have the same model specification) and False otherwise. For an array R of size n, an entry e is called common if at least n /13 entries of R are equal to e. We want to design an algoritlun that returns all common entries using 0(n log n) calls to Check.

a) Prove that there can be at most 13 distinct common entries in R.

b) Let e be a common entry in R[1..n]. Prove that e is a common entry in at least one of the arrays R[1..Ln/2_1] andR[Ln/2_1+1..n].

c) Give a precise pseudo-code description of a divide-and-conquer algoritlun that finds all common entries of an array R[1..n] in time e(n log n). Prove that your algorithm is correct and analyze its time complexity. Hint: Use part (b) in the design and part (a) in the analysis of your algorithm.

Reference no: EM13944418

Questions Cloud

Example of a particular object : 1. What is an example of a particular object that can be both discrete and continuous, although at different times?
Introduced heat exchange system revamp problem : Example introduced a heat exchange system revamp problem. If the plate heat exchanger E101 in Figure 2.19 is the gasketed-plate type, then the exchanger area can be increased by adding plates to the exchanger. How much additional area must be adde..
How much income does fm recognize from the transactions : Within 30 days of formation, FM collects the receivables and sells the inventory  for $60,000 cash. How much income does FM recognize from these transactions, and what is its character?
Process of evaluating the supply network : A clear majority are either in the process of evaluating their supply network, just completed
Prove that there can be at most 13 distinct common entries : Tyrell-III has n replicants and each has a particular model specification. There are many models. Unfortunately, there was an insurgency on the planet and some of the replicants destroyed a critical database that held replicant data.
Explain why cause and effect pose such a problem for hume : Explain why cause and effect pose such a problem for Hume. Do you think causality would offer similar difficulties for any empiricist? Give reasons for your answer.
Shows a simple heat-exchange system : Figure shows a simple heat-exchange system. A feed stream is heated by heat exchange in a plate exchanger and then further heated in a steam heater before entering a fixed-bed reactor. The product from the reactor is cooled in the plate exchanger ..
Work as a start-up firm in the united states : Define a business idea, preferably one that you create, that might work as a start-up firm in the United States. Your proposed firm should provide a particular product or service mainly to customers located outside the United States.
What is the amount of guaranteed payment made by partnership : What is the amount of guaranteed payments made by the partnership during 2016? How much is the partnership's ordinary income after any deduction for guaranteed payments?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Describe algorithm that finds maximum feasible flow in graph

Describe an algorithm that finds a maximum feasible flow in G. Denote by MF(|V|, |E|) the worst-case running time of an ordinary maximum flow algorithm.

  Describe the key components in requirements elicitation

Analyze and describe functional and nonfunctional requirements in software engineering and describe the key components in requirements elicitation and analysis and use technology and information resources to research issues in software engineering.

  Question about damaged database

Suppose if you were one of the users of a damaged database, discuss how would you be affected by such a failure and what measures could you take to prevent it?

  Using big-o notation state the runtime for this algorithm

1 consider searching algorithms on the following array of datanbsp22 21 9 4 16 2 10 14 20 31 26 19 17 28 8

  Linear-time algorithm for computing the strong component

On the basis of a linear-time algorithm for computing the strong component containing a given vertex v, describe a simple quadratic-time algorithm for computing the strong components of a digraph.

  Show the final shortest-path tree

draw a table showing the intermediate distance values of all vertices at each iteration of the algorithm; (ii) show the final shortest-path tree.

  Create all the possible combinations of array a

The subset-sum problem is defined as follows: given a set B of n positive integers and an integer K, can you find a subset of B whose elements' summation is equal to K? Design an algorithm to solve this problem. Address its correctness and running..

  Data structures and algorithm design

Data Structures and Algorithm Design

  Question 1 explain five types of information systems and

question 1. explain five types of information systems and give an example of each.question 2. describe three common

  Implement the insertion sort algorithm for sorting an array

Implement the Insertion Sort algorithm for sorting an array of n elements. In this algorithm, the main loop index i runs from 1 to n-1. On the ith iteration, the element a[i] is "inserted" into its correct position among the subarray a[0..i].

  Highlighting features that boost performances

highlighting features that boost performances

  Question related to sequential files

In spite of the fact that sequential files lack direct targeted addressing of each of the records and fields, they are the most widely used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd