Use master theorem to find out its asymptotic bounds

Assignment Help Data Structure & Algorithms
Reference no: EM131233907

1. Given T(n) = 16T(n/4) + n2 .

(a) Use master theorem to find out its asymptotic bounds.

(b) Use substitution method to prove its asymptotic bounds.

2. Given T(n) = T(3n/19)+5n. Use master theorem to find out its asymptotic bounds.

3. Assuming you have a task to sort the telephone numbers of a major carrier. What sorting algorithm will you use? Please justify your answers.

4. You are asked to modify the textbook version of Merge-Sort on page 31 into a new algorithm of Merge-Triplet-Sort. In Merge-Triplet-Sort, an input array A into three new arrays L, M, and R that stands for left, middle, and right. Assume the input array A always has a size of n = 3k, and you can divide A into three equal-sized new arrays.

(a) Please revise the textbook pseudo codes of Merge-Sort() and Merge() functions for your Merge-Triplet-Sort algorithm.

(b) Please find the asymptotic bounds for running time of Merge-Triplet Sort. You must show your procedure.

5. Please modify the pseudo code of Count-Sort algorithm on page 195 in the textbook such that an input array of numbers in the rage of [-n, n] can be sorted.

6. Modify Bucket-Sort pseudo code on page 201 in the textbook such that it can sort floating number in the rage of [-50, 50).

Textbook - Introduction to Algorithms, Third Edition by THOMAS H. CORMEN, CHARLES E. LEISERSON,  RONALD L. RIVEST and CLIFFORD STEIN.

Reference no: EM131233907

Questions Cloud

Discuss reference groups that may affect buying behavior : State the specific outcomes and metrics for the organization change ? Discuss reference groups that may affect buying behavior. Be certain to include aspirational, membership and disassociative examples. Discuss social class. How does social class re..
Does amvac have a sustainable business strategy : Does Amvac have a sustainable business strategy? Why or why not?Should the law prohibit Amvac and others from exporting pesticides barred from use in the United States? Why or why not?
Calculate the utilization of the three employees : Calculate the utilization of the three employees. As an effort to improve operations, the manager has cross-trained the frozen drink maker and the Espresso drink maker, i.e., now each of them can make both frozen and espresso drinks. What is the util..
What are some of the major strategies and risks : What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?
Use master theorem to find out its asymptotic bounds : Given T(n) = 16T(n/4) + n2. Use master theorem to find out its asymptotic bounds. Use substitution method to prove its asymptotic bounds
Find the specific compressor work and the exit temperature : A water-cooled air compressor takes air in at 20?C, 90 kPa and compresses it to 500 kPa. The isothermal efficiency is 88% and the actual compressor has the same heat transfer as the ideal one. Find the specific compressor work and the exit tempera..
System of overhead conveyor belts to send constant stream : Whirlpool, a manufacturer of household appliances, uses a system of overhead conveyor belts to send a constant stream of parts to employees on the line throughout the plant. Beneath the conveyor belt is a netting or mesh screen to catch any parts or ..
Find the specific heat transfer and work : A flow of R-410a at 2000 kPa, 40?C in an isothermal expander is brought to a state of 1000 kPa in a reversible process. Find the specific heat transfer and work.
Explain rationale for strategic alliance or joint venture : Identify a global strategic alliance or a joint venture by a firm that is not your Strategic Audit firm, nor being studied by another student in your class. Explain the rationale for the strategic alliance or joint venture. Discuss how the strategic ..

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  How to sort an array using insertion sort

How to sort an array using insertion sort and track teh number of swaps during the sorting - Can someone provide the answer with reference to data structure?

  Illustrate insertion into the linear hash file

Illustrate insertion into the linear hash file. Suppose that bucket splitting occurs whenever file load factor exceeds (is greater than) 0.8.

  Represent -293125 in binary system 16 bits 9 for mantissa 1

question 1. represent -29.3125 in binary system. 16 bits. 9 for mantissa 1 for sign 5 for exponet 1 for sign of

  Compare client-server computing and cloud computing

Compare and contrast client-server computing and cloud computing. Determine the major risks and rewards that each offers to the organizations that use such approaches. Justify your response.

  You have been hired as an information systems consultant to

you have been hired as an information systems consultant to examine state health centre a fictitious multi-centre state

  Defined asa collection of distinct elements

SIT221 -DATA STRUCTURES AND ALGORITHMS. In mathematics, a set is defined asa collection of distinct (no duplication) elements . These elements could be anything - numbers, characters, strings, etc.There is no particular order of the elements in a ..

  What is k-nearest neighbor data mining algorithm

Natural language processing (NLP), a subfield of artificial intelligence and computational linguistics, is an important component of text mining. What is the definition of NLP? What are the five steps in the backpropagation learning algorithm?

  What is a linear implementation

What is a linear implementation? What kind of implementation of the ADT table is appropriate for retrieval-dominated applications, if the maximum size of the table is known? Why

  What is the probability that you hire exactly n times

What is the smallest value of n such that an algorithm whose running time is 100n2 runs faster than an algorithm whose running time is 2n on the same machine?

  Find the kth largest value in an unsorted array of n element

find the kth largest value in an unsorted array of N elements. Estimate the running time. It should be better than quick sort running time.

  Perform an insertion sort on the file pointed

Using only the local data already supplied in FileSort, perform an insertion sort on the file pointed to by fd. Use lseeks for this; do not try to create any sort of array or list. An array-based version of insertion is supplied for your reference.

  Differences between array and linked list implementation

Discuss the differences between the array implementation and the linked list implementation of queues. List the advantages and disadvantages of each implementation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd